Icest 2012 01
Icest 2012 01
2012
PROCEEDINGS OF PAPERS
VOLUME 1
SOFIA, 2012
ICEST 2012 Proceedings of the XLVII International Scientific Conference on
Information, Communication and Energy Systems and Technologies
organized by the Faculty of Telecommunications, Technical University
of Sofia, June 28-30, 2012, Veliko Tarnovo, Bulgaria
All rights reserved. This book, or parts thereof, may not be reproduced in any form or by any
means, electronic, or mechanical, including photocopying or any information storage and the
retrieval system now known or to be invented, without written permission from the Publisher.
ISBN: 978-619-167-002-4
WELCOME TO ICEST 2012
Dear Colleagues,
First of all I would like to thank you for attending our conference, in this way you
contribute to the improvement of the scientific value of this conference and make it one of the
most popular conferences in Balkan region. At the same time this conference turns to be a tool
for spreading our scientific achievements with the help of colleagues from Japan, USA, United
Kingdom, France and many more. For second year in addition to the founders of this
conference: Faculty of Telecommunications, Technical University of Sofia, Technical Faculty,
University “St. Kl. Ohridski”, Bitola and Faculty of Electronics, University of Nish, we enjoy the
participation and hospitability of Faculty of Mathematics and Informatics, “St. Cyril and St.
Methodius” University of Veliko Tarnovo and on the behalf of all of us I would like to express
our deep gratitude for their support.
This year there are 169 contributions with 352 authors from Bulgaria, Macedonia,
Serbia, Canada, Portugal, Romania, Hungary, Finland and Germany to be presented at our
conference. The submissions are evaluated by 74 reviewers from Bosnia and Herzegovina,
Bulgaria, Macedonia, Romania, Serbia and USA.
Dear colleagues and guests, I wish you successful participation in the conference. I
believe that this conference will go forward in raising its standard and influence and it will be
helpful in the scientific development and maturity of our young colleagues. I believe that here
we will witness the birth of new ideas for joint projects and future scientific achievements,
because we all work in the same direction – the development of technical and technological
foundations of future economy.
2012
Organized by:
University of Niš
Faculty of Electronic Engineering
Serbia
TECHNICAL PROGRAM COMMITTEE
General Chairman:
Arnaudov R. Technical University of Sofia, Bulgaria
Vice Chairmen:
Milovanović B. University of Niš, Serbia
Mitrovski C. University “St. Kliment Ohridski” Bitola, Macedonia
Members:
Acevski N. University “St. Kliment Ohridski” Bitola, Macedonia
Atanasov I. Technical University of Sofia, Bulgaria
Bekiarski Al. Technical University of Sofia, Bulgaria
Bock J. University of Ottawa, Canada
Boumbarov O. Technical University of Sofia, Bulgaria
Ceselkoska V. University “St. Kliment Ohridski” Bitola, Macedonia
Dimitrov K. Technical University of Sofia, Bulgaria
Dochev I. Technical University of Sofia, Bulgaria
Dončov N. University of Niš, Serbia
Iliev G. Technical University of Sofia, Bulgaria
Iliev I. Technical University of Sofia, Bulgaria
Janković D. University of Niš, Serbia
Janković N. University of Niš, Serbia
Jeftić M. University of Niš, Serbia
Jolevski I. University “St. Kliment Ohridski” Bitola, Macedonia
Jordanova L. Technical University of Sofia, Bulgaria
Kostov M. University “St. Kliment Ohridski” Bitola, Macedonia
Makal J. Technical University of Byalistok, Poland
Marković V. University of Niš, Serbia
Markovski A. University “St. Kliment Ohridski” Bitola, Macedonia
Mitrevski P. University “St. Kliment Ohridski” Bitola, Macedonia
Nakamatsu K. University of Hyogo, Japan
Nedelkovski I. University “St. Kliment Ohridski” Bitola, Macedonia
Nikolov T. Technical University of Sofia, Bulgaria
Nikolova B. Technical University of Sofia, Bulgaria
Nikolova Zl. Technical University of Sofia, Bulgaria
Pencheva E. Technical University of Sofia, Bulgaria
Perić Z. University of Niš, Serbia
Pleshkova Sn. Technical University of Sofia, Bulgaria
Popova A. Technical University of Sofia, Bulgaria
Poulkov Vl. Technical University of Sofia, Bulgaria
Radevska P. University “St. Kliment Ohridski” Bitola, Macedonia
Stanković R. University of Niš, Serbia
Stanković Z. University of Niš, Serbia
Stefanović M. University of Niš, Serbia
Stefanovski M. University “St. Kliment Ohridski” Bitola, Macedonia
Stojčev M. University of Niš, Serbia
Stojmenov L. University of Niš, Serbia
Tasić D. University of Niš, Serbia
Todorov G. St. Cyril and St. Methodius University of Veliko Tarnovo, Bulgaria
Todorova M. St. Cyril and St. Methodius University of Veliko Tarnovo, Bulgaria
Trpezanovski Lj. University “St. Kliment Ohridski” Bitola, Macedonia
Tsenov A. Technical University of Sofia, Bulgaria
Valtchev S. NOVA-University, Lisbon, Portugal
Zieleznik L. Brookes University Oxford, UK
ORGANIZING COMMITTEE
Chairman:
Arnaudov R. Technical University of Sofia, Bulgaria
International coordinators:
Todorov G. St. Cyril and St. Methodius University of Veliko Tarnovo
Milovanović B. University of Niš, Serbia
Mitrovski C. University “St. Kl. Ohridski", Bitola, Macedonia
Local coordinators:
Todorova M. St. Cyril and St. Methodius University of Veliko Tarnovo
Poulkov Vl. Technical University of Sofia, Bulgaria
CONFERENCE SECRETARIAT
Tsankova J. Conference Coordinator
Dochev I. Technical Secretariat
Members:
Nikolova M. Technical University of Sofia, Bulgaria
Stoyanova K. Technical University of Sofia, Bulgaria
Kirilova A. Technical University of Sofia, Bulgaria
Ivanova M. Technical University of Sofia, Bulgaria
Popova K. Technical University of Sofia, Bulgaria
Markova G. St. Cyril and St. Methodius University of Veliko Tarnovo
Kalushkov T. St. Cyril and St. Methodius University of Veliko Tarnovo
Markov A. St. Cyril and St. Methodius University of Veliko Tarnovo
Address:
Technical University of Sofia
Faculty of Telecommunications
Kl. Ohridski Blvd. 8, 1000, Sofia, Bulgaria
Phone/Fax: (+359 2) 965 30 95
E-mail: fktt-dekan@tu-sofia.bg
icest@tu-sofia.bg
In 2001 the conference was renamed EIST (Energy and Information Systems and
Technologies). In 2002 the Faculty of Electronic Engineering, Niš, Serbia became a co-
organizer of the conference and the conference changed its name into ICEST (International
Scientific Conference on Information, Communication and Energy Systems and
Technologies).
This year the conference is organized by the Faculty of Telecommunications at the Technical
University of Sofia and Faculty of Mathematics and Informatics of St. Cyril and St. Methodius
University of Veliko Tarnovo.
CONFERENCE TOPICS
i
Ad-Hoc Supported, Connection Fault-Tolerant Model for Mobile
Distributed Transaction Processing .................................................................................43
Tome Dimovski, Pece Mitrevski
University "St. Kliment Ohridski" of Bitola, Macedonia
ii
TELECOMMUNICATION SYSTEMS AND TECHNOLOGY – PART 2
New Teletraffic Loss System – Polya/G/n/0......................................................................89
Seferin Mirtchev, Rossitza Goleva, Georgi Balabanov, Velko Alexiev
Technical University of Sofia, Bulgaria
An Evaluation of an UMTS/WLAN Interworking Architecture using IEEE 802.21 ..........93
Alexandru Vulpe, Octavian Fratu
University Politehnica of Bucharest, Romania
Simulation of Rare Events in Teletraffic Systems with Single Queue ............................97
Elena Ivanova, Rostislav Raev, Dimitar Radev
University of Ruse "Angel Kanchev", Bulgaria
VoIP over a Cognitive Network with Limited Availability...............................................101
Yakim Mihov, Boris Tsankov
Technical University of Sofia, Bulgaria
BEP Performance of DE-QPSK and DE-OQPSK over composite fading
channels in the presence of imperfect signal extraction...............................................105
Milica Petković, Bojana Nikolić, Bata Vasić, Goran Đorđević
University of Niš, Serbia
Quality of Service (QoS) – main principles and managing tools ..................................109
Miroslav Slavov, Pencho Penchev
Technical University of Gabrovo, Bulgaria
Pitch perception in complex sound ................................................................................113
Marko Janković, Dejan Ćirić
University of Niš, Serbia
SIGNAL PROCESSING
Digital Bandpass IIR Filers with High Selectivity ...........................................................117
Peter Apostolov
College of Telecommunications and Posts, Bulgaria
Features of time-frequency analysis visualization of large
dynamic range signals.....................................................................................................121
Tihomir Trifonov, Ivan Simeonov*, Rosen Dzhakov**
St. Cyril and St. Methodius University of Veliko Tarnovo, Bulgaria
*Vasil Levski National Military University, Bulgaria
**Vasil Levski National Military University - Shumen, Bulgaria
Accuracy Improvement of Allpass-based Digital Hilbert Transformers .......................125
Kamelia Nikolova, Georgi Stoyanov
Technical University of Sofia, Bulgaria
Acoustic Standing Waves in Closed Cylindrical Enclosures ........................................129
Ekaterinoslav Sirakov, Hristo Zhivomirov
Technical University of Varna, Bulgaria
Control of Radiation Directivity Applying Independent Element Dodecahedral
Loudspeaker.....................................................................................................................131
Marko Jelenković, Dejan Ćirić, Jelena Zdravković, Stefan Tomić
University of Niš, Serbia
Modulated bandpass Farrow Decimators and Interpolators .........................................135
Djordje Babic, Vesa Lehtinen*
Union University, Serbia
*Tampere University of Technology, Finland
iii
Simulation of Codec for Adaptive Linear Prediction .....................................................139
Rumen Mironov
Technical University of Sofia, Bulgaria
ELECTRONICS
Tracking Analogue to Digital Converter Modelling using VHDL-AMS ..........................224
v
Marieta Kovacheva, Ivailo Pandiev
Technical University of Sofia, Bulgaria
Development of Parameterized Verilog-AMS Model of Photovoltaic Cells ..................228
Elissaveta Gadjeva, Georgi Valkov
Technical University of Sofia, Bulgaria
Optical Control through Stencils Cutting in Surface Mount Technology.....................232
Valentin Videkov, Aleksei Stratev, Georgi Furkov
Technical University of Sofia, Bulgaria
CONTROL SYSTEMS
Control cards. Control cards and control points as part of the manufacturing
process .............................................................................................................................247
Violina Georgieva, Alexander Hadjidimitrov*
Technical University of Sofia, Bulgaria
*Team VISION Bulgaria Ltd., Bulgaria
Computer Simulation and Analysis of Two-Coordinate Position Electric Drive
Systems.............................................................................................................................251
Mikho Mikhov, Marin Zhilevski
Technical University of Sofia, Bulgaria
vi
Mariya Eremieva, Viktoriya Sabeva, Mariya Nikolova, Emiliya Koleva
Naval Academy "Nikola Vaptsarov", Bulgaria
Design of a high – sensitive capacitive sensor for wireless monitoring of bulk
material’s level..................................................................................................................265
Teodora Trifonova, Valentina Markova, Valentin Todorov, Ventseslav Draganov
Technical University of Varna, Bulgaria
Different Implementations of Serial Pseudorandom/Natural Code Converters ...........269
Dragan Denić, Goran Miljković, Jelena Lukić, Miodrag Arsić, Dragan Živanović
University of Niš, Serbia
ENGINEERING EDUCATION
High-quality Primary School Education in the Field of Electrotechnics and
nformatics - Beginning of the Development of Successful Engineers.........................277
Sonja Cvetkovic, Zoran Stankovic*
Primary school "Cele Kula", Serbia
*University of Niš, Serbia
VOLUME 2
ix
COMPUTER SYSTEMS AND INTERNET TECHNOLOGIES (POSTER)
Management of Software Project using Genetic Algorithm ..........................................403
Milena Karova, Nevena Avramova, Ivaylo Penev, Yulka Petkova
Technical University of Varna, Bulgaria
Railway Infrastructure Maintenance Efficiency Improvement by Using
Tablet PCs.........................................................................................................................407
Slobodan Mitrović, Svetlana Čičević, Slađana Janković, Norbert Pavlović, Slaviša Aćimović,
Snežana Mladenović, Sanjin Milinković
University of Belgrade, Serbia
Intelligent learning system for High education ..............................................................411
Aleksandar Kotevski, Gjorgi Mikarovski
University "St. Kliment Ohridski" of Bitola, Macedonia
Using Cloud Computing in e-learning.............................................................................415
Gjorgi Mikarovski, Aleksandar Kotevski
University "St. Kliment Ohridski" of Bitola, Macedonia
An Approach to Define Interfaces for Mobile Telemetry................................................418
Ivaylo Atanasov, Ventsislav Trifonov, Evelina Pencheva
Technical University of Sofia, Bulgaria
Architecture of Automated System Software for Testing Petrol Engines ....................422
Georgi Krastev
University of Ruse "Angel Kanchev", Bulgaria
Mazes - Classification, Algorithms for Finding an Exit..................................................425
Maya Todorova, Nedyalko Nikolov
Technical University of Varna, Bulgaria
Integration of Biometrics to the E-Health .......................................................................428
Milena Stefanova, Oleg Asenov
St. Cyril and St. Methodius University of Veliko Tarnovo, Bulgaria
Psychology of the Perpetrators of Computer Criminal Acts and Review
of Legal and Economic Consequences for the Community ..........................................431
Zaklina Spalevic, Jelena Matijasevic, Dejan Rančić*
University Business Academy, Serbia
*University of Niš, Serbia
P2P Wireless Network Based on Open Source Linux Routers .....................................435
Hristofor Ivanov, Miroslav Galabov
St. Cyril and St. Methodius University of Veliko Tarnovo, Bulgaria
An Approach to Optimization of the Links' Load in the MPLS Domain ........................439
Veneta Aleksieva
Technical University of Varna, Bulgaria
Performance Study of Virtualization Platforms for Virtual Networking Laboratory.....443
Hristo Valchanov
Technical University of Varna, Bulgaria
Integration of Video Conference into eLearning Platform Based on Moodle
for the Vocational School ................................................................................................447
Ilche Acevski, Valentina Acevska, Linda Fahlberg-Stojanovska
University "St. Kliment Ohridski" of Bitola, Macedonia
System for Multi-variant Multi-parametric WEB-based Test Control ............................451
Vladimir Karailiev, Raicho Ilarionov, Hristo Karailiev
Technical University of Gabrovo, Bulgaria
x
Methods for Assessing Information Sites ......................................................................455
Tihomir Stefanov
St. Cyril and St. Methodius University of Veliko Tarnovo, Bulgaria
ELECTRONICS (POSTER)
FPGA (Field Programmable Gate Arrays) – Based Systems-On-a-Programmable-Chip
(SOPC) Development for Educational Purposes............................................................489
Valentina Rankovska
Technical University of Gabrovo, Bulgaria
Electronic Simulator of Sound (Noise) Effects for Electric Vehicles in Urban
Areas .................................................................................................................................493
Georgi Pavlov, Galina Cherneva, Radoslav Katsov, Ivaylo Nenov, Ilko Tаrpov
Todor Kableshkov University of Transport, Bulgaria
Spray Deposition of PVDF Layers with Application in MEMS Pressure Sensors ........495
Georgi Kolev, Mariya Aleksandrova, Krassimir Denishev
Technical University of Sofia, Bulgaria
Different Technological Methods for Offset Compensation in Si Hall Effect
Sensors.............................................................................................................................499
Ivelina Cholakova
Technical University of Sofia, Bulgaria
xi
Multipoint Video Control System Applicable in Assistance of Elderly and
People with Disabilities....................................................................................................502
Ivo Iliev, Serafim Tabakov, Velislava Spasova
Technical University of Sofia, Bulgaria
Computer Modeling of RF MEMS Inductors Using SPICE.............................................505
Elissaveta Gadjeva
Technical University of Sofia, Bulgaria
Deposition of Transparent Electrodes for the Future Generation of Flexible
Displays ............................................................................................................................509
Mariya Aleksandrova, Georgy Dobrikov, Kostadinka Gesheva*, Georgy Bodurov*, Ivelina
Cholakova, Georgy Kolev
Technical University of Sofia, Bulgaria
*Bulgarian Academy of Science, Bulgaria
Investigation of Over Voltage Protection Circuit for Low Power Applications ............513
Tihomir Brusev, Nikola Serafimov, Boyanka Nikolova
Technical University of Sofia, Bulgaria
Realization of Low-frequency Amplitude Modulator and Demodulator
with FPAAs .......................................................................................................................517
Ivailo Pandiev
Technical University of Sofia, Bulgaria
Modification method to determining the output parameters in the audio
power stage with complex load.......................................................................................521
Plamen Angelov
Burgas Free University, Bulgaria
Modified method for design of the low-frequency audio driver ....................................525
Anton Petrov, Plamen Angelov
Burgas Free University, Bulgaria
SPICE Modelling of Magnetoresistive Sensors..............................................................529
Boyanka Nikolova, Georgi Nikolov, Milen Todorov
Technical University of Sofia, Bulgaria
Maximizing Power Transfer to the Remote Terminal of PCM4 System ........................533
Zoran Zivanovic, Vladimir Smiljakovic
IMTEL Komunikacije a.d., Serbia
Design, Analysis and Modifications of a Telecom Converter........................................537
Zoran Zivanovic, Vladimir Smiljakovic
IMTEL Komunikacije a.d., Serbia
Image processing of infrared thermograms for hidden objects ...................................541
Anna Andonova
Technical University of Sofia, Bulgaria
xii
Dynamic Braking in Induction Motor Adjustable Speed Drives ....................................552
Nebojša Mitrović, Milutin Petronijević, Vojkan Kostić, Bojan Banković
University of Niš, Serbia
Application of Active Front End Rectifier in Electrical Drives.......................................556
Bojan Banković, Nebojša Mitrović, Vojkan Kostić, Milutin Petronijević
University of Niš, Serbia
Cyclic Current Rating of Single-Core XLPE Cables with Respect to Designed
Life Time ...........................................................................................................................560
Miodrag Stojanović, Dragan Tasić, Aleksa Ristić
University of Niš, Serbia
The Influence of the Geometry of the Inductor on the Depth and Distribution
of the Inductively Hardened Layer ..................................................................................564
Maik Streblau, Bohos Aprahamian, Vladimir Shtarbakov*, Hristofor Tahrilov
Technical University of Varna, Bulgaria
*METAL PLC, Bulgaria
Examination of Frequency Controlled Asynchronous Drives at Variable Load
Torque - Laboratory Simulator ........................................................................................567
Vasil Dimitrov
Todor Kableshkov University of Transport, Bulgaria
xiii
ENGINEERING EDUCATION (POSTER)
Multitool Online Assisted Design of Communication Circuits and Systems ...............589
Galia Marinova
Technical University of Sofia, Bulgaria
E-learning Systems as a Behavioural Analyst ...............................................................593
Valentin Videkov, Rossen Radonov
Technical University of Sofia, Bulgaria
Application of Remote Instrumentation in Learning using LabView ............................595
Ivo Dochev, Liljana Docheva
Technical University of Sofia, Bulgaria
Simulation of third-order dispersion in single optical channel.....................................599
Kalin Dimitrov, Tsvetan Mitsev, Lidia Jordanova
Technical University of Sofia, Bulgaria
Developing of a Video Information System for the Technical University of Sofia .......603
Kalin Dimitrov, Rumen Mironov, Alexander Bekjarski
Technical University of Sofia, Bulgaria
xiv
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
1
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
(n) ∞ ( n) ( n) ( n) ,where m(t) is the correlation mask upon reception defined by:
s (t ) = ∑ E p (t − jT − c T − a ε ) (2)
TX TX 0 s j c j
j = −∞ N −1
S (1)
m(t ) = ∑ v(t − jT − c T ) (8)
(n ) is the energy
where p0(t) is the normalized base impulse, ETX s j s
j=0
transmitted by each pulse, c (jn )Tc is the time shift imposed by
v(t ) = p (t ) − p (t − ε ) (9)
0 0
the TH code, c (nj ) is the j-th TH code sequence used by user n,
and Tc is the chip duration. Each TH code is a sequence of Np Combining Eqs. (7) and (9) we obtain [4]:
identically and independently distributed random variables,
each of them with a probability of 1/Nh, and with values Z =Z +Z +Z (10)
u mui n
within [0,Nh-1] interval, where Nh is the cardinality of the TH
code. In order to identify the users, each of them will be Under the SGA hypothesis, Zmui and Zn represents random
assigned a specific TH code in such a way to avoid collision Gaussian processes with a 0 mean and a variance of σ mui 2
and
at the receiver. The term a (nj )ε the time-shift introduced by σ n respectively. The average bit error rate Prb can be written
2
the data; ε is the specific PPM time delay and aj is the binary as [3,4,5]:
value assigned to the jth pulse for user n. The binary vector a
represents the output of a (Ns,1) repetition coder, that receives
1 E
b
as input the binary vector b, meaning that Ns pulses carry the Pr = erfc
b 2 2
2(σ + σ 2
information of one bit. The binary vector a length is the length )
n mui
of b time Ns.[1,3,4,5]
Assuming that the channel is modeled by Eq. (1), in the =
1
erfc
((SNR )
n
−1
+ (SIR ) )
−1 −1
(11)
2 2
presence of AWGA noise the received signal can be written as
N
u ∞ ( n) ( n) ( n)
The bit energy of the received signal, Eb, can be obtained
r (t ) = ∑ ∑ E p (t − jT − c T − a ε − τ ) + n(t ) (3) by calculating the energy of the useful components at the
RX 0 s j c j
n = 1 j = −∞ output of the receiver for all Ns pulses that form a bit.
Therefore
where Nu is the number of users and ERX is the energy of each
transmitted pulse at the receiver. [1,3,4,5]. (1) 2
E =E N (1 − R (ε )) 2 (12)
Referring to user (1) and assuming that the receiver is b RX s 0
perfectly synchronized, such that the time delay is accurately
known at the receiver and can be assumed 0, for simplicity, ,where R0(t) is the autocorrelation function of the base impuse
the received signal can be written as [4]: p0(t) pulse. In the presence of the thermal noise, the signal to
noise ratio (SNR) can be written as:
r (t ) = r (t ) + r (t ) + n(t ) (4)
u mui (1)
N s E RX E (1)
SNR n = (1 − R 0 (ε )) = b (1 − R 0 (ε )) (13)
N0 N0
Next, focusing our analysis on the bit interval Tb and taking
into account the symmetry of the system, the analysis can be
Regarding the signal to interferences ratio (SNI) it can be
performed within [0,Tb] interval. The ru(t) and rmui(t)
contribution can be written for t ∈ [0, Tb ) as[4]:
written as
(1) 2
E N (1 − R (ε )) 2 (1 − R (ε )) 2 γ (14)
N −1 SIR = RX s 0 = 0 R 1
S (1) (1) (1)
r (t ) = ∑ E p (t − jT − c T − a ε ) (5) N σ 2 N ( n )
RX 0 s j c j 1 u ( n) u E RX
j=0 N σ2 ∑ E M
R ∑
T s M RX b
s n=2 n = 2 E (1)
∞ RX
N ( n)
U ∑ E p (t − jT
r (t ) = ∑ j = −∞ RX 0 s By combining Eqs. (13) and (14) and replacing them in Eq.
mui
n =1 (11) we obtain the average bit error rate [3,4,5]:
− 1
(n) (n) ( n) −1
−c T − a ε −τ ) (6)
j c j
−1
(1) (15)
(1 − R (ε )) 2 γ
In the decision process performed at the reception, the 1 1 Eb
Pr = erfc (1 − R (ε )) + 0 R
b 2 0 N E ( n)
correlation output at reception is thus given by [2,4,5]: 2 N 0
2 u RX
σ M Rb ∑
T n = 2 E (1)
b RX
Z = ∫ r (t )m(t )dt (7)
0
2
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
C. TH-PAM
(n) ∞ ( n ) ( n) ( n)
s (t ) = ∑ E a p (t − jT − c T ) (16)
TX TX j 0 s j c
j = −∞
3
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
IV. CONCLUSION
In this paper we have evaluated the performances of an IR-
UWB system in the presence of multi-user interferences and
in the Standard Gaussian Approximation hypothesis. We have
noticed that the multi-user interferences influence on the
performances of such a system is important only if the number
of users is large enough. We have also noted that the PAM
modulation is far more robust than the PPM one, achieving
error probabilities ten times smaller at the same Eb/N0 ratio.
As the number of users increases, the Prb is asymptotically
Fig. 3 Probability of error for 1: 200 users
limited to a higher value.
As the number of users increases, the Prb is asymptotically Next, investigating the validity of the SGA hypothesis in
limited to a higher value. If the number of users increses up to comparison with simulation results, we observed that, for a
50, the probability of error decrease only to 2 10-3, in the PAM relatively low number of users (up to 10) the results obtained
case, and to 2.5 10-2, in the PPM case. All graphs shows that based on simulation are better with respect to the error
PAM is slightly more robust then PPM with respect to Prb probability then the ones obtained under the SGA
performances. assumptions, showing that the formulas developed represents
As it can be seen in Figs. 2 and 3, Prb increases with the an upper limit for the Prb.
augmentation of the number of users. In order to evaluate the In a future work we will focus on increasing the number of
performances of the system with the number of users users in the simulation, developing simulations under different
increases. we represented graphically Prb as a function of sets of parameters and checking other hypotheses, like the
number of users. Thus, in Fig. 4 we can see that in the multi-user interference model based on package collision or
presence of more than 200 users, the error probability is very the chip-synchronous hypothesis.
high, with a magnitude order of 10-1 , 10-2, and the system is
dominated by M.U.I.
In order to validate the theoretical results, we simulated the ACKNOWLEDGEMENT
UWB receiver in the presence of multi-user interference. We
have been particularly interested in how precise the SGA This research activity was supported by Ministry of
hypothesis used for error probability estimation is fulfilled. Communications and Information Society of Romania under
We simulated a system with 7 and 10 users. Each user the grant no.106/2011 "Evolution, implementation and
generates stream of data with a bit period Tb=18ns, leading to transition methods of DVB radiobroadcasting using efficiently
a bit rate of 55.55Mbit/s. Every bit period is organized in 3 the radio frequencies spectrum".
frames with a duration Ts=6ns, meaning 3 pulses are
transmitted for every bit. Each frame is then divided into 6 REFERENCES
slots with a length of Tc=1ns. All users transmit with the same
format of the signal. The results are shown in Fig. 5.
[1] M. Ghavami, L. B. Michael, R. Kohno, “Ultra Wideband
We can notice that the theoretical model used for the Signals and Systems in Communication Engineering”, John
evaluation Prb underestimates the effect of MUI. The error Wiley & Sons, 2007.
probability obtained based on the simulation is larger than the [2] Kharrat-Kammoun, F. Le Martret, C.J. Ciblat,“Performance
one the SGA hypothesis predicted. In the 7 user case the analysis of IR-UWB in a multi-user environment”, Wireless
difference between the error probability from the theoretical Communications, IEEE Transactions on, Issue 11,Noiembrie
model and the simulated one is larger than in the 10 user case: 2009.
[3] G. Durisi, S. Benedetto, “Performance evaluation and
comparison of different modulation schemes for UWB
multiaccess systems”, Communications, 2003. ICC '03. IEEE
International Conference on
[4] Shing TenqChen,Ying-Haw Shu, Ming-Chang Sun, Wu-Shiung
Feng and Chao-Hao Lee, “Performance comparison of PPM-
TH, PAM-TH, and PAM-DS UWB Rake receivers with channel
estimators via correlation mask”, ICCOM'05 Proceedings of the
9th WSEAS International Conference on Communications
[5] M. Z. Win and R. A. Scholtz. “Ultra-wide bandwidth time-
hopping spread spectrum impulse radio for wireless-access
communication”. IEEE Transactions on Communications,
vol.48, no. 4 pp.:679-691, 2000.
[6] Zhiquan Bai, Kyungsup Kwak, “Performance analysis of TH-
PAM of UWB system and the coded scheme” Wireless
Communications, Networking and Mobile Computing, 2005.
Proceedings. 2005 International Conference on
Fig. 4 Comparasion between theoretical ans simulation results for 7
and 10 users
4
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
A. Multipath Channel
5
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
-?
( )= (6)
waves parallel to the ground; at receiver, the angle of arrival is
uniformly spread in [-π,π]; the receiver antenna is ?
omnidirectional.[3,4]. 1−( ⁄ )
1
The baseband normed Jake spectrum is:
( ) = , | | ≤ (2) where 0 ≤ ,ABC ≤| |≤ .AEF ≤ and the norming factor
1−( ⁄ )
defined as:
⁄2
where fd is the maximum Doppler deviation. -? = (7)
It has been proven that in a 3-D isotropic scattering sin': G ,AEF
H − sin': G ,ABC
H
environment, in which the arrival angles are uniformly
,ABC șK .AEF are the minimum and maximum
distributed in the elevation plan and in that of the azimuth, the where
is: ( , )=
total PSD for the θ angle of elevation and the α azimuth angle
sin
,0 ≤ < ,0 ≤ < 2 , the theoretical
positive frequencies for which the spectrum is non-zero.
, 4
These frequencies can be determined from the PSD of the
spectrum is flat.[2,3,4]. angle of arrival.
1
The baseband normed flat Doppler spectrum is: The restricted Jakes Doppler spectrum was considered to be
! ( ) = , | | ≤ (3)
symmetrical. The asymmetric spectrums occur in the case of
2
directional antennae, of aeronautical channels and of the
The next model corresponds to the multi-path components satellite mobile radio channels. Taking an asymmetrical
with high rates of delay in the UHF communications. It has spectrum in consideration, the pulse response will be
also been put forward in the case of the high frequency (HF) complex.
channels as well as for the aeronautical channels with a VHF The baseband asymmetrical restricted Jakes
Doppler(ajakes) spectrum is expressed analytically [2,4]:
-E
band [3,4].
( )= (8)
The baseband normed Jake Gaussian spectrum is:
1
() E
'
# ( ) = & *+ )
(4) 1−( ⁄ )
$2 %#
where σg is the standard deviation. where , − ≤ ,ABC ≤ ≤ .AEF ≤ and the norming
The Jakes bi-Gaussian model is built from two Gaussian factor defined as:
-E = (9)
spectrums which are shifted in frequency. This is used for
sin': G ,AEF
H − sin': G ,ABC
H
modeling the long echoes which can occur in urban areas and
hilled terrains [2,3,4].
the central frequencies, ;#: and ;# are the power gains, and
PSD representation is also influenced by the frequency of the
where | | ≤
Doppler spectrum.
and the norming factor defined as:
1
As we have mentioned beforehand, the Jakes Doppler
;? = O O (11)
spectrum is build based on the fact that the angle of arrival at
6
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
Curba probabilitatii de eroare de bit pentru OFDM cu BPSK
0
10
doppler jakes
III. ORTHOGONAL FREQUENCY-DIVISION doppler
doppler
flat
rjakes
-1
Pe
transmission is a multi-carrier type of transmission.
-3
A complex OFDM signal, x(t), during the mTu<t<(m+1)Tu 10
1WX(Y
10
W\ W\
-5
10
0 5 10 15 20 25 30 35 40
where xk(t) is the k-th subcarrier modulated with the Eb/No, dB
doppler jakes
doppler flat
-1 doppler rjakes
IV. PERFORMANCE ANALYSIS 10
doppler
doppler
ajakes
gaussian
doppler rounded
-2
Simulations were carried out over an Additive white 10
7
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
In figure 2 the most favorable cases from the point of view ACKNOWLEDGEMENT
of the bit error probabilities are obtained for the rounded and
Gaussian type of Doppler, while the most unfavorable This research activity was supported by Ministry of
situation is that of the channel which is affected by the Rjakes Communications and Information Society of Romania under
Doppler. For the Ajakes Doppler, the proportion between the the grant no. 106/2011 "Evolution, implementation and
bit energy and the power spectral density reaches the value of transition methods of DVB radiobroadcasting using efficiently
13,8 dB, increasing until 22,8 dB and 23,7 dB in the case of the radio frequencies spectrum".
the channel which is affected by the Jakes Doppler, flat
respectively. Modifying the Doppler deviations to 100Hz, the
REFERENCES
around the value of the ], /_ proportion that increases by 8
only major difference that occurs in figure 4.25 is noticeable
dB, from 13,8 dB to 21,8 dB, in the case of the channel [1] Andreas F. Molisch, Wireless Communication Second Editions,
affected by the Ajakes Doppler. Wiley & Sons.,2011.
[2] Franz Hlawatsch , Gerald Matz , Wireless Communications
Over Rapidly Time-Varying Channels , Elsevier 2011.
V. CONCLUSION [3] R. H. Clarke, “A statistical theory of mobile-radio reception”,
Bell Sys.Tech. J., vol. 47, no. 6, pp. 957–1000, July-Aug. 1968.
[4] P. M. Shankar, Fading and Shadowing in Wireless Systems,
In this paper we compared the performances of several
Springer 2011.
Doppler fading models, presented in II.B, for an OFDM [5] Haiying Zhu, Bouchard, L., Boucher, L. , Performance of
communication. Thus, for lower Doppler frequencies we OFDM based wireless LAN system under Doppler over
obtained a better probability of error than for higher ones. Rayleigh fading, Communication Technology Proceedings,
Furthermore, in the case of Rayleight fading, for the same International Conference on. Vol.2,pp 1234 - 1237 , 2003.
probability of error, Eb/N0 is at minimum in the case of the [6] K.A.Hamdi, Unified Error-Rate Analysis of OFDM over Time-
rounded Doppler model and at a maximum for the Rjakes Varying Channels, Wireless Communications, IEEE
Dopller model. For Rician fading we observed the minimum Transactions on, Vol.10, No. 8,pp. 2692 – 2702, 2011.
for Eb/N0 is still for the rounded Doppler model but the [7] L. Noor A. , Anpalagan ;S. Kandeepan. SNR and BER
derivation and analysis of downlink OFDM systems with noisy
maximum is, in this case for the Jakes Doppler model.
fading Doppler channels, Signal Processing and Its
Therefore, both for Rician and Rayleight fading the more Applications, 9th International Symposium on, pp 1-4, 2007.
robust Doppler model is the rounded Doppler model. The
worst model, in terms of probability of error is the Rjakes
respectively the Jakes Doppler model.
8
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
9
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
10
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
b) Spectrum ch.64 (DVB-T) b) Spectrum ch.40 (DVB-T), ch. 36 and ch.41 (PAL-K)
Fig.1. ch.64 (DVB-T) Fig.2. ch.40 (DVB-T)
TABLE IV TABLE V
16-QAM VALUES 64-QAM VALUES
C/N S/N Eb/N0 SER BER EVM C/N S/N Eb/N0 SER BER EVM
dB dB dB % dB dB dB %
2 1,8831 -3,6659 0,3743 0,1995 60,01 2 1,8831 -5,4268 0,5629 0,2871 52,71
4 3,8831 -1,6659 0,3153 0,1681 47,67 4 3,8831 -3,4268 0,5298 0,2702 41,87
6 5,8831 0,3341 0,2469 0,1316 37,86 6 5,8831 -1,4268 0,4878 0,2488 33,26
8 7,8831 2,3341 0,1732 0,0923 30,08 8 7,8831 0,5732 0,4351 0,2219 26,42
10 9,8831 4,3341 0,1027 0,0547 23,89 10 9,8831 2,5732 0,3704 0,1889 20,98
12 11,8831 6,3341 0,0472 0,0251 18,98 12 11,8831 4,5732 0,2941 0,1500 16,67
14 13,8831 8,3341 0,0146 7,79E-03 15,07 14 13,8831 6,5732 0,2103 0,1073 13,24
16 15,8831 10,3341 2,46E-03 1,31E-03 11,97 16 15,8831 8,5732 0,1281 0,0654 10,52
18 17,8831 12,3341 1,61E-04 8,60E-05 9,51 18 17,8831 10,5732 0,0611 0,0312 8,35
20 19,8831 14,3341 2,39E-06 1,27E-06 7,56 20 19,8831 12,5732 0,0200 0,0102 6,64
22 21,8831 16,3341 3,37E-09 1,80E-09 6,00 22 21,8831 14,5732 3,68E-03 1,88E-03 5,27
24 23,8831 18,3341 1,16E-13 6,17E-14 4,77 24 23,8831 16,5732 2,76E-04 1,41E-04 4,19
26 25,8831 20,3341 0 0 3,79 26 25,8831 18,5732 5,03E-06 2,56E-06 3,33
28 27,8831 22,3341 0 0 3,01 28 27,8831 20,5732 9,89E-09 5,04E-09 2,64
30 29,8831 24,3341 0 0 2,38 30 29,8831 22,5732 5,74E-13 2,93E-13 2,10
BER and EVM at an amendment of C/N from 2÷30 dB and indication for Quality on Figs.1a and 2a, which reaches 99%.
respectively S/N from 1,88-29,88 dB at α=0,1. For low values of S/N (1,88÷19,88 dB) BER is very high
The numeric results are shown graphically in Figs.3, 4 and and the receiving is either with errors or not possible, and
5, while in both cases (16-QAM/ 64-QAM) after the Viterbi EVM amends from 7,3% to 0,92%. For S/N ≥23 dB EVM
and Reed-Solomon decoding BER is low (10-9 ÷10-11) - for values are almost equal. At an S/N =29,88 dB for 16-QAM is
S/N between 22 and 28 dB. That confirms itself through the EVM=2,38% and for 64-QAM is EVM=2,1%.
11
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
60
55
50
45
40 16-QAM
35 64-QAM
EVM, %
30
25
20
15
10
5
0
0 2 4 6 8 10 12 14 16 18 20 22 24 26 28 30
S/N, dB
Fig.5. EVM=func(S/N)
12
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
Strength
Strength
Quality
Quality
Quality
Level
Level
Level
13
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
On the base of those results were formulated the aims and is the degradation in Power received between digital TV
tasks of this research: signal (PrD) and analog TV signal (PrA) and is given by the
a) To be established the reason for not receiving ch.40 following formula [9]:
and ch.52;
b) To eliminate the problems with receiving ch.40 and PR[dB] = PrD [dBW ] − PrA [dBW ] (1)
ch.52, i.e. to be provided their receiving with STB3 and other Eq.1 could be written as follows, having in mind the
similar to it [2], [3]. connections between power and voltage [10] by impedance
To accomplish those aims were made a number of 75Ω:
measurements according to the standards [1], [4], [6] and the
results were analyzed. As a result of that was made a PR[dB] = U rD [dBµV ] − U rA [dBµV ] . (2)
conclusion, that such a problem could appear at a low
selectivity at adjacent channel and by an interference of The practical determination of PR is made due to Eq.2 for
analog signal (PAL-K), when it is transmitted in higher ch.40 and measured levels of two signals (digital and analog)
adjacent channel (by measurements with a spectrum analyzer, via spectrum analyzer (SA) Promax AE-476 (Fig.3),
was established, that such channels are available: ch.41 and according the requirements of [7].
ch.53 at standards G and K), (Fig.2). Note: During the simulation was established that the solutions of
the placed aims for ch.40 are also valid for ch.52, but at
To increase the selectivity at a adjacent channel (without corresponding values of constructive elements (coils and capacitors)
changing anything in the STB3) was made the decision for and frequency parameters of band pass filter.
creating a band filter with a certain slope and frequency band, The dependence of deterioration of the signal-to-noise ratio
which would be formed in a different module. Its assembly (∆S/N) from the amendment of PR is shown on Fig.4. The
must be outside STB3 and to be applicable to different STBs resultant ratio signal-to-noise (S/NI) at a presence of
with similar parameters. interference from the analog channel in the digital one are
calculated through the following formula:
4
III. CIRCUIT SOLUTIONS AND RESULTS
2
For researching the influence of the parameters of Band
Pass Filter (BPF) on improving the quality of receiving for 0
the aforenamed channels, as well as for optimal choosing of -15 -10 -5 0 5 10 15 20 25 30 35 40
suitable scheme solution (Table II) was used an Ansoft PR, dB
Designer VS 2.0 [7]. A large number of simulations were
made to determine the scheme solution and the number of Fig.4. ∆S/N[dB] =func (PR [dB])
links in filter, which give the necessary values of Protection
ratio (PR), [1], [4], [6], [8]. The theoretical and experimental
researches were made with five values for PR, where in dB, S / NI [dB] = S / N [dB] − ∆S / N [dB] , (3)
14
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
TABLE II
BER
PR
№ BPF Experimental Theoretical
dB 1) 2) 3) 1)* 2)* 3)*
1 no -6 0,0297955 0,0153234 0,0787797 0,0150099 0,0076909 0,0402155
1,E-04
PB = 0,89.[erfc ( 10( S / N I −7, 43) / 10 / 7 )]
BER
1,E-06 1)
× [1 − 0,44.erfc ( 10( S / N I −7, 43) / 10 / 7 )] . (4) 2)
3)
1,E-08 1)*
The dependence of BER from PR is given in Fig.5 2)*
wherefrom is visible, that with antennas 1) and 2) and BPF 3)*
the receiving of ch.40 is already possible, when PR≥15dB.
1,E-10
At values less than 15dB, receiving with active filter (Fig.3)
-10 -5 0 5 10 15 20 25 30 35 40
and any of the antennas is difficult (presence of sampling)
PR, dB
or impossible (Fig.6).
Fig.5. BER = func (PR [dB])
15
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
IV. CONCLUSION
The offered solution for improving the receiving with
DVB-T receivers (computer TV-tuners) gives the
opportunity to achieve the (placed) aims. By the practical
realization is needed to change the filters for ch.40 and
ch.52 or to remove them, and points 1 and 2 (Fig.3) to be
connected directly with each other in order to receive all
other channels. On Fig.3 is offered a version with shift of
the three regimes. BPF can be realized with varicaps so that
the passing channel is changed electrically. However, this
solution requires an additional supply and so is the practical
realization elaborated. At a subsequent publication will be
offered another version, by which the mentioned problems
would be removed and the practical application of the
offered solution will be facilitated.
a) BER>10-4
REFERENCES
[1] ETSI EN 300 744 v.1.4.1, Digital Video Broadcasting
(DVB); Framing structure, channel coding and modulation
for digital terrestrial television, 2001.
[2] DIGIVOX mini Hybrid TV tuner and video capture unit.
MICRO-STAR INT’L CO., LTD.
[3] USB TV tuner AVerTV Hybrid Volar HD. AVer Media
Technology.
[4] TR 101 190: “Digital Video Broadcasting (DVB);
Implementation Guidelines for DVB Terrestrial Services:
Transmission Aspects”. European Telecommunications
Standards Institute (ETSI), 1997.
[5] P. Angueira, M. Vélez, D. De La Vega, G. Prieto, D. Guerra,
J. M. Matías and J.L. Ordiales, “DTV reception quality field
tests for portable outdoor reception in a single frequency
network”, IEEE Trans., Broadcasting, vol.50, no.1, pp.42-48,
2004.
[6] Rec. ITU-R BT. 1368-2 “Planning Criteria for Digital
b) 10-6<BER<10-4 Terrestrial Television Services in the VHF/UHF Bands”,
2000.
[7] http://www.ansys.com/Products/Simulation+Technology/Ele
ctromagnetics/Ansoft+Designer.
[8] S. O’Leary “Digital/Analogue Co-channel Protection Ratio
Field Measurements” IEEE Trans., Broadcasting, vol. 44, no.
4, pp. 540-546, 1998.
[9] Regional Radiocommunication Conference for planning of
the digital terrestrial broadcasting service (RCC-04), ITU-R
Report, Geneva 2004.
[10] D. Dobrev, L.Yordanova, Receiving on radio- and TV
programs by means satellite and cable, Sofia, Electroninvest,
1996.
c) BER<10-6
Fig.6. Pictures with BPF for different PR and BER
16
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
17
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
RF generator
Antenna electrode Antenna electrode
2 mm 2 mm
1.1 mm
Fig. 3. Top view and current distribution of a two patch antenna, operating
t at 66 GHz.
8 µm Antenna input resistance
140 g=20
g=40
120 g=60
g=80
3 µm 100
Transistors Transistors g=100
80
Re{Z in}
Substrate 675 µm 60
or
6 µm 40
20
18
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
Antenna
Feeding network
19
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
two-port measurement systems using three different, but not [3] C. Cao and K. K. O, “A 140-GHz fundamental mode voltage-controlled
standardised, port loads: direct connection of the measurement oscillator in 90-nm CMOS technology,” IEEE Microw. Wireless Com-
pon. Lett., vol. 16, no. 10, pp. 555–557, Oct. 2006.
ports at the reference plane (Through), connection of high- [4] T. Yao, M. Q. Gordon, K. K. W. Tang, K. H. K. Yau, M.-T. Yang,
reflection-factor load (Reflect) and connecting the ports with P. Schvan, and S. P. Voinigescu, “Algorithmic design of CMOS LNAs
a short line (Line). and PAs for 60 GHz radio,” IEEE J. Solid-State Circuits, vol. 42, no. 5,
pp. 1044–1057, May 2007.
Therefore calibration structures have also been designed on [5] H. Yordanov and P. Russer, “Integrated on-chip antennas for chip-to-chip
a different chip. The structures allow for the measurement of communication,” in Proceedings of the IEEE Antennas and Propagation
the input impedance of the antennas at their input ports, while Society International Symposium, 2008, San Diego, CA, 2008.
[6] ——, “Integrated on-chip antennas using CMOS ground planes,” in Pro-
de-embedding the influence of the balun transformers. ceedings of the 10th Topical Meeting on Silicon Monolithic Integrated
Circuits in RF Systems, New Orleans, LA, 2010, pp. 53–56.
V. S UMMARY [7] P. Russer, N. Fichtner, P. Lugli, W. Porod, J. Russer, and H. Yordanov,
This work discusses the design of on-chip integrated anten- “Nanoelectronics-based integrated antennas,” IEEE Microwave Maga-
zine, vol. 11, Dec. 2010.
nas with high radiation efficiency and low area requirements. [8] H. Rempp, J. Burghartz, C. Harendt, N. Pricopi, M. Pritscow, C. Reuter,
There are two possibilities for minimising the antenna losses— H. Richter, I. Schindler, and M. Zimmermann, “Ultra-thin chips on foil
one is using high-resistivity substrate and the other is using for flexible electronics,” in Proc. of IEEE Intl. Solid-State Circ. Conf.,
2008, San Francisco, CA, Feb. 2008, pp. 334–617.
very thin substrate. An experimental setup has been prepared [9] H. Richter, H. Rempp, M.-U. Hassan, C. Harendt, N. Wacker, M. Zim-
to verify the characteristics of integrated antennas on thin sub- mermann, and J. Burghartz, “Technology and design aspects of ultra-thin
strate. The antenna input impedance and radiation efficiency silicon chips for bendable electronics,” in Proc. of IEEE Intl. Conf. on
IC Design and Technology, 2009, Austin, TX, May 2009, pp. 149–154.
have been computed. [10] J. Burghartz, W. Appel, C. Harendt, H. Rempp, H. Richter, and M. Zim-
mermann, “Ultra-thin chips and related applications, a new paradigm in
ACKNOWLEDGEMENT silicon technology,” in Proc. of ESSCIRC, 2009, Athens, Nov. 2009, pp.
This work has been supported by the Marie Curie Pro- 28–35.
[11] P. Russer, Electromagnetics, Microwave Circuit and Antenna Design for
gramme. Communications Engineering, 2nd ed. Nordwood, MA: Artec House,
2006.
R EFERENCES [12] S. B. Cohn, “Slot line on a dielectric substrate,” IEEE Trans. Microw.
[1] H. Yordanov, M. T. Ivrlač, A. Mezghani, J. Nossek, and P. Russer, Theory Tech., vol. 17, pp. 768–778, Oct. 1969.
“Computation of the impulse response and coding gain of a digital [13] T. O. Dickson, M.-A. LaCroix, S. Boret, D. Gloria, R. Beerkens,
interconnection bus,” in 24th Annual Review of Progress in Applied and S. P. Voinigescu, “30-100-GHz inductors and transformers for
Computational Electromagnetics ACES, Niagara Falls, Canada, Apr. millimeter-wave (Bi)CMOS integrated circuits,” IEEE Trans. Microw.
2008. Theory Tech., vol. 53, pp. 123–133, Jan. 2005.
[2] K. K. O, K. Kim, B. A. Floyd, J. L. Mehta, H. Yoon, C.-M. Hung, [14] D. M. Pozar, Microwave Engineering, 3rd ed. Ney York, NY: John
D. Bravo, T. O. Dickson, X. Guo, R. Li, N. Trichy, J. Caserta, W. R. B. Wiley & Sons, 2005.
II, J. Branch, D.-J. Yang, J. Bohorquez, E. Seok, L. Gao, A. Sugavanam,
J.-J. Lin, J. Chen, and J. E. Brewer, “On-chip antennas in silicon ICs
and their application,” IEEE Trans. Electron Devices, vol. 52, no. 7, pp.
1312–1320, Jul. 2005.
20
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
The main objectives of the SCP technology [1, 3, 5, 6, 7, One of the main parts of the SCP system is the random
10, 20, 21] are: phased antenna. In principle all kind of antenna arrays could
• To receive one or more radio signals coming from be used, but for Ku and Ka bands particular suitable is the
one or several spatially distributed sources (satellites, Radial Line Slot Antenna (RLSA). Until now it is used as
base stations), insuring high gain of the antenna systems phased array for fixed satellite reception.
and using fixed or mobile receiving terminals, equipped The main features of the SCP approach are:
with SCP signal processing systems. • Simple, cheap and flat passive radial line antenna,
• To ensure spatial selectivity high enough to cancel suitable for mass production in Ku and Ka frequency
the same frequency channel interference, coming from bands.
• One channel convenient microwave receiver with
1
Veselin Demirev is with the Faculty of Telecommunications at simple signal processing.
Technical University of Sofia, 8 Kl. Ohridski Blvd, Sofia 1000, • Omni directional for the cooperative satellite or
Bulgaria, E-mail: demirev_v@tu-sofia.bg. terrestrial base station, but with high figure of merit G/T.
• Selection of different satellites and polarizations by
PN-codes.
21
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
• Applications in existing S-DVB systems with minor microwave receivers, leading to low active jamming
modifications of the ground transmitters, compatible with probability.
the existing satellite transponders. • The SCP-RPSC approach could be a breakthrough
• Multi-beam and soft handover features. technology, leading to unpredictable increase of the
frequency reuse factor in satellite and terrestrial
wideband networks. Close situated subscriber
III. RPSC TECHNOLOGY terminals could communicate with base stations,
using the same frequency channel without
The idea to use SCP principle in transmit mode [2, 9, 15, interference. The isolation between the terminals will
16] was born during the SCP project research. The be provided by their specific random phase spread
transmitting antennas, as well as the receiving random phase coding.
antenna arrays in SCP technology are pure passive, without
any active or nonreciprocal elements. The specific SCP
processing is situated in the receiver (Fig.2). According to the IV. SCP-RPSC APPLICATIONS
basic electromagnetic antenna lows the replacement of the
passive transmitting antenna with passive random phase A. Satellite Digital Video Broadcasting (DVB-S)
antenna array in the transmitter, and vice versa in the receiver
should not change the system working principles and system Proposal for a SCP-CDMA GEO satellite system,
parameters. The transmitted by the random phase antenna suitable for DVB-S communications in Ku-band for fixed and
array signals have specific phase spread. It can be considered mobile terminals, is given in [4]. The proposed algorithm for
as random spatial coding. system parameters evaluation, based on link budget
calculations, gives good results – Figure of merit (G/T) better
than 14 dBi/K for 60 cm antenna diameter at very low prize
(in order of several $). Similar proposal for quasi GEO
satellites at elliptical polar orbits is given in [8].
B. Space Links
22
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
23
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
VI. CONCLUSIONS [16] V. Demirev,, “SCP-RPSC technology – the new challenge in the
broadband satellite communications”, Caspian Telecoms,07,
Conference Proceedings, pp.178-181, Istanbul, Turkey, 2007.
The practical implementations of SCP-RPSC principles will [17] V. Demirev, “Application of SCP-RPSC Mobile
drastically change the existing paradigm in the mobile Communications in SPS Technology”, ISRSSP,07, Conference
microwave broadband satellite and terrestrial communication Proceedings,, pp. 129-132, Sofia, Bulgaria, 2007.
business in general. Many of the existing problems of the [18] V. Demirev, “SCP-RPSC Technology in the Feeder Lines of the
proposed systems, dealing with frequency and orbital resource LEO,s Communication Systems”, CEMA,07, Conference
sharing, beam pointing, beam shadowing, terrorist jamming Proceedings, pp. 1-5, Sofia, Bulgaria, 2007.
etc., will be solved successfully. [19] В. Демирев, “Приложение на технологията SCP-RPSC в
микровълновите Wi-Max системи”, Телеком, 07, Трудове на
конференцията, 29, Варна, България, 2007.
REFERENCES [20] V. Demirev, “Review of SCP Test Set-up and Results – I”,
CEMA, 08, Conference Proceedings, pp.7-10, Athens, Greece,
[1] V. Demirev, “Method and System for Space Diversity 2008.
Communications”, Patent WO/2003/013022, [21] V. Demirev, “Review of SCP Test Set-up and Results – II”,
PCT/BG2002/000016, 3.02.2003, H04B1/07 (2006.01), H04B CEMA, 08, Conference Proceedings, pp. 11-13, Athens, Greece,
7/02 (2006.01), Priority №105671/04.07.2001,BG. 2008.
[2] V. Demirev, “Radiocommunication Method and System with [22] В. Демирев, “Приложение на технологията SCP-RPSC в
poly-phase spread coding”, Patent WO/2003/107552, широколентовата мобилна спътникова система MOWGLY”,
PCT/BG2003/000027, 27.12.2003, H04B1/69 (2006.01), H04B Телеком, 08, Трудове на конференцията, стр.121-126 ,
7/06 (2006.01), Priority №106819/13.06.2002, BG. Варна, България, 2008.
[3] V. Demirev, V., “SCP technology – the new challenge of [23] В. Демирев, “Приложение на технологията SCP-RPSC в
broadband satellite communications”, ICEST’04, Conference широколентовите спътникови комуникации за въздушния
Proceedings, pp. 159-162, Bitola, Macedonia, 2004. транспорт”, Бултранс,10, Трудове на конференцията, стр.
[4] V. Demirev, A. Efremov “SCP-CDMA GSO’s system 34-37, Созопол, България, 2010.
proposal”, ICEST’04, Conference Proceedings, pp. 163-166, [24] В. Демирев, “Основни характеристики на микровълновите
Bitola, Macedonia, 2004. HAPS системи, базирани на технологията SCP-RPSC”,
[5] V. Demirev, “The probability theory with application in SCP Телеком, 10, Трудове на конференцията, стр.172-179 ,
technology”, ICEST’04, Conference Proceedings, pp. 167-168, София, България, 2010.
Bitola, Macedonia, 2004. [25] V. Demirev, “SCP-RPSC WI-MAX systems – the new
[6] B. Демирев, В. Витков, С. Kaменополски, A. Eфремов, approach for the next generation microwave access strategies”,
“Изследване на някои параметри на технологията SCP с Caspian Telecoms,08, Conference Proceedings, Istanbul,
МАТLAB симулации”, Телеком,04, Трудове на Turkey, 2008.
конференцията, том 1,стр.321 -326, Варна, България, 2004. [26] V. Demirev, “SCP-RPSC Technology – The Perfect Solution of
[7] V. Demirev, A. Efremov, “Some Important Parameters of the the Broadband MSS Problems”, Computer and Communication
SCP Technology”, ICEST’05, Conference Proceedings, V.2, Engineering, vol.4, N1, pp.43-46, 2010.
pp.516-518, Nis, Serbia and Montenegro, 2005. [27] V. Demirev, “Random Phase Spread Coding Multiple Access -
[8] R. Markov, V. Demirev, “Application of SCP technology in the New competitor of CDMA in the broadband wireless
Quasi-GEO satellite systems”, ICEST’05, Conference networks”, Journal of Applied Electromagnetism, vol.13,
Proceedings, V.2, pp.519-521, Nis, Serbia and Montenegro, Number 1(June 2011), pp. 26-32, 2011.
2005. [28] V. Demirev, “The regulatory aspects of SCP-RPSC technology
[9] V. Demirev, “Review of SCP-RPSC technology”, ICEST’05, – could they solve the VMES problems”, Journal of Applied
Conference Proceedings, V.2, pp.630-633, Nis, Serbia and Electromagnetism, vol.13, Number 1(June 2011), pp. 33-38,
Montenegro, 2005. 2011.
[10] B. Демирев, Д. Илиева, “Информационен капацитет по [29] В. Демирев, “Широколентови радиокомуникационни
Shannon на SCP система, ограничена по топлинен шум”, системи, базирани на летателни апарати”, Бултранс,2011,
Телеком, 05, Трудове на конференцията, том 1, стр.95-100, Трудове на конференцията, стр. 43-46, Созопол, България,
Варна, България, 2005. 2011.
[11] B. Демирев, “Спътниковите комуникации – тенденции и [30] В. Демирев, “Приложение на технологията SCP в системите
приложения”, CIO Journal, 11, стр.34-38, 2006. за спътникова навигация”, Бултранс,2011, Трудове на
[12] V. Demirev, “Broadband satellite SCP-RPSC Communications конференцията, стр. 47-50, Созопол, България, 2011.
– the new chance for the telemedicine”, CEMA, 07, Conference [31] V. Demirev, “SCP Rake Receiver - The Possible Solution of N-
Proceedings, pp. 17-21, Sofia, Bulgaria, 2006. LOS HAPS and WIMAX mm-Wave Networks”, CEMA,11,
[13] В. Демирев, A. Eфремов, E. Mихайлова, “Информационен Conference Proceedings, pp. 18-21, Sofia, Bulgaria, 2011.
капацитет по Shannon на ограничена по интерференция SCP [32] В. Демирев, “Приложение на технологията SCP-RPSC в
система”, Телеком,06, Трудове на конференцията, стр.272- спътниковата МЕО система О 3 b на Google”, Телеком,11,
277 , Варна, България, 2006. Трудове на конференцията, София, 2011.
[14] B. Демирев, B., M. Hиколова, “Приложение на технологията
SCP-RPSC в широколентови HAPS”, Телеком,06, Трудове
на конференцията, стр.283-288 , Варна, България, 2006.
[15] В. Демирев, “Приложение на вероятностната теория в
технологията SCP-RPSC”, Телеком,06, Трудове на
конференцията, стр.278-282, Варна, България, 2006.
24
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
25
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
26
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
27
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
28
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
29
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
II. MODELING PROCEDURE rLr , respectively, for a wire segment running along radial
direction are rCr kCr rc and rLr k Lr rc , where rc
In the conventional TLM time-domain method, an EM field represents a mean dimension of the node cross-section in r
r r
strength in three dimensions, for a specified mode of
oscillation in a metallic cavity, is modelled by filling the field direction ( rc i i1 z / 2 , (where ri and ri+1 are
space with a network of link lines and exciting a particular 2
field component through incident voltage pulses on lower and upper limits of the TLM wire node in radial
appropriate lines. An efficient computational algorithm of direction (Fig.3)), while rCr and rLr are factors empirically
scattering properties, based on enforcing continuity of the obtained by using known characteristics of the TLM network.
electric and magnetic fields and conservation of charge and Distributed capacitance and inductance per unit length,
magnetic flux [13], is implemented to speed up the simulation needed for modelling of wire segments, may be expressed as:
process. EM properties of different mediums in the cavity are
2
modelled by using a network of interconnected nodes, a Cwr , Lwr ln rLr / rw (6)
typical structure known as the symmetrical condensed node – ln rCr / rw 2
SCN [13]. Each node describes a portion of the medium where rw is a real probe radius.
shaped like a cubic (Cartesian rectangular mesh) or a slice An equivalent radius of the fictitious cylinder can be easily
(Non-Cartesian cylindrical mesh) depending on the coordinate kept constant along nodes column in a rectangular grid.
system applied. Additional stubs may be incorporated into the However, for a radial wire conductor in a cylindrical grid, as it
TLM network to account for inhomogeneous materials and/or is shown in Fig. 3, mean cross-section dimensions of TLM
electric and magnetic losses. nodes, through which a wire passes, vary making difficult to
When cylindrical structures are concerned, a non-Cartesian preserve distributed capacitance and inductance of a wire per
cylindrical mesh in the coordinate system (φ, r, z) can be used unit length. As result, admittance of the wire network link
for the modelling purpose. The coordinate system used and line, interposed over the existing network to account for wire
the port designations are shown in Fig. 1. Simulation proceeds presence, varies from one TLM node to another (Fig. 2).
exactly as for a SCN with stubs in a Cartesian grid. The only Therefore, an additional connecting procedure for wire
modification involves the calculation of stub parameters segments with different link-lines admitances has been
where account must be taken of the details of the new implemented into the existing TLM-based software [12].
geometry.
φj+1 Dφ j φj
w,inc + + w,inc
2Vi 2Vi+1
Vrpz - w -
Vrp Ve
z wire
Vznr Dri ri+1 Yiw w
Yi+1
ri
Vzn interface r
φ Region 1 Interface Region 2
Vnr
Vpz
a) b)
Vnz
Vpr Fig. 2. a) TLM nodes in rφ plane through which wire runs and b) an
interface between two nodes
Vzp y
r r
Vzpr
Reflected voltages on both directions of the interface
Vrn
z
x
between nodes with different cross-section, which at the same
Vrnz time represent incident voltages respect to the node center for
the next time step, can be expressed as follows:
Yw Yw
Vew 2Viw1,inc w i1 w 2Vi w ,inc w i w (7)
Yi Yi1 Yi Yi1
Fig. 1. A cylindrical SCN
Yi w Yiw1 w,inc
Vi w,ref Vi Viw1,inc Viw1,inc (8)
The TLM wire node in a cylindrical grid is based on a SCN Yi w Yiw1
with one small modification in the form of additional link and Yi w Yiw1 w,inc
stub lines interposed over the existing network to account for Viw1,ref Vi Viw1,inc Vi w,inc (9)
increase of capacitance and inductance of the medium caused Yi w Yiw1
by wire presence. The single column of TLM nodes, through where Vew is an equivalent voltage at the interface, Vi w,inc and
which a wire conductor passes, can be used to approximately Viw1,inc are the incident voltages.
form the fictitious cylinder which represents capacitance and
inductance of a wire per unit length [8]. Such compact wire model allows for simple incorporation
An equivalent radius of the fictive cylindre in a cylindrical of voltage/current sources and lumped loads and takes into
grid for calculating the capacitance and inductance, rCr and account the physical dimensions of wire probes [9],
determined only by TLM mesh resolution.
30
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
31
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
[3] S. Amnartpluk, C. Phongcharoenpanich, S. Kosulvit, and M. [8] V. Trenkic, The development and characterization of advanced
Krairiksh, "A power divider using linear electric probes nodes for TLM method, Ph.D. Thesis, University of
coupling inside conducting cylindrical cavity", Int. Symp. on Nottingham,1995.
Circuits and Systems 3, 2003, pp. 419-422. [9] V. Trenkic, A.J. Wlodarczyk, and R. Scaramuzza, "Modelling
[4] B. Milovanovic, N. Doncov, and A. Atanaskovic, "Tunnel type of coupling between transient electromagnetic field and
microwave applicator analysis using the TLM method", Proc. of complex wire structures", International Journal of Numerical
the 4th International Workshop on Computational Modelling: Electronic Networks, Devices and Fields, 12, 1999,
Electromagnetics in the Time Domain: TLM/FDTD and Related pp.257-273.
Techniques, CEM-TD 2001, Nottingham, United Kingdom, [10] J. Joković, B. Milovanović, and N. Dončov, "TLM analysis of
2001, pp.77-84. cylindrical metallic cavity excited with a real feed probe",
[5] B. Milovanovic and N. Doncov, "TLM modelling of the circular International Journal of RF and Microwave Computer Aided
cylindrical cavity loaded by lossy dielectric sample of various Engineering, John Wiley&Sons, USA, 16, 2006, pp.346-354.
geometric shapes", Journal of Microwave Power and [11] J. Joković, B. Milovanović, N. Dončov, "Numerical Model of
Electromagnetic Energy, A Publication of the International Transmission procedure in Cylindrical Metallic Cavity
Microwave Power Institute, VA, USA, 37, 2002, pp.237-247. Compared with Measured Results", International Journal of RF
[6] J. Joković, B. Milovanović, T. Ranđelović, "TLM Modelling of and Microwave Computer-Aided Engineering, Publication of
Microwave Applicator with an Excitation Through The the Wiley, 18, 2008, pp.295-302.
Waveguide", Microwave and Optical Computer Techonology [12] Bratislav Milovanović, Nebojša Dončov, Jugoslav Joković,
Letters, John Wiley&Sons, 48, 2006, pp.2320-2326. Tijana Dimitrijević, "EM Field Monitoring in Circular Cavity
[7] S. Ivkovic, B. Milovanovic, A. Marincic, and N. Doncov, Using Wire Compact Model Implemented in Cylindrical TLM
"Theoretical and experimental investigations of resonance Mesh", Proc. of the TELSIKS 2009 Conference, Niš, Serbia,
frequencies in loaded cylindrical microwave cavity", Proc. of October 7-9, 2009, pp. 339-342
the 3rd IEEE TELSIKS'97 Conference, Nis, Yugoslavia, 1997, [13] C. Christopoulos, The Transmision-Line Modelling (TLM)
pp.306-309. Method, Series on Electromagnetic Wave Theory, IEEE/OUP
Press, 1995.
Fig. 4. Transmission coefficient magnitude in the cylindrical Fig. 5. Transmission coefficient magnitude in the cylindrical
cavity loaded with one water layer cavity loaded with two water layers
32
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
33
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
The four D type flip flops form 4 stages shift register. At use ieee.std_logic_1164.ALL;
every tick of the clock signal the logic level on every input is use ieee.numeric_std.ALL;
shifted one step left. In this situation the output of the XOR library UNISIM;
gate is a source of pseudo random bit sequence. The function use UNISIM.Vcomponents.ALL;
of inverter is to start the generator, because in the beginning at
every inputs and outputs there are only zeroes. The XOR gate
need different levels to produce ones at his outputs, that’s why entity tesALTYS is
there is inverter at the one of two inputs of the XOR gate [4]. port ( clk : in std_logic;
The period of repetition depends on number of D type flip Led5 : out std_logic;
flops. In particular case it can be calculated by formula 1, Led6 : out std_logic;
where “n” is number of D type flip flops. Led7 : out std_logic);
end tesALTYS;
2n 1 (1) …………..
end component;
In the shown scheme in fig.2 Feedback polynomial is (2), attribute CLKFXDV_DIVIDE of DCM_CLKGEN :
the period of repetition is 15 because 24 -1 = 15 component is "2";
x 4 x3 1 (2) attribute CLKFX_DIVIDE of DCM_CLKGEN :
component is "1";
For example if the number of bits are 16 then the period of attribute CLKFX_MD_MAX of DCM_CLKGEN :
repetition will be 65536, because 216-1 = 65535. If the component is "0.000";
numbers of bits are 19, the period of repetition is 524287 and attribute CLKFX_MULTIPLY of DCM_CLKGEN :
so on. So we can connect the necessary number of D type flip component is "4";
flops for desired period of repetition.
attribute CLKIN_PERIOD of DCM_CLKGEN :
For implementation of the generation algorithm it is
necessary to produce confirmation code for the FPGA chip. component is "0.0";
This code makes individual connections between the different attribute SPREAD_SPECTRUM of
parts in the chip. For code configuration tool we used Xilinx DCM_CLKGEN : component is "NONE";
ISE Web Pack tool which is freely accessed in Xilinx web site attribute STARTUP_WAIT of DCM_CLKGEN :
[5]. For top layer of our project we used schematic design component is "FALSE";
fig.2. attribute BOX_TYPE of DCM_CLKGEN :
component is "BLACK_BOX";
component FD
generic( INIT : bit := '0');
port ( C : in std_logic;
D : in std_logic;
Q : out std_logic);
end component;
attribute BOX_TYPE of FD : component is
"BLACK_BOX";
Fig.2. Principle realization of PRNG
component INV
port ( I : in std_logic;
O : out std_logic);
The HDL code is too big to be shown in paper, that’s why end component;
we will show a essential part of it in listing 1. In the beginning
attribute BOX_TYPE of INV : component is
of code there is definition of standard libraries like ieee.std,
ieee.numeric and so on. After that we have definition of inputs "BLACK_BOX";
and outputs of the chip. At the next lines there is the
configuration of the divider of the clock generator. After that component XOR2
we have defining inputs and outputs of the logic elements D port ( I0 : in std_logic;
flip flop, inverter and XOR gates of the scheme. At the end of I1 : in std_logic;
the code there is shown interconnections between the logic O : out std_logic);
elements and I/O pins. end component;
…………..
Listing1 HDL Code for Spartan 6 board. begin
Led5 <= Led5_DUMMY;
library ieee;
Led6 <= Led6_DUMMY;
34
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
Led7 <= Led7_DUMMY; For our development we used evaluation board Altys
XLXI_7 : DCM_CLKGEN Spartan 6 from DIGILENT (fig.3) [6] . It is very powerful
………… board with rich peripheral devices such as LAN interface unit,
………… a couple of switch units and micro switches, LED’s, USB,
UART, HDMI, external RAM memory. We choose to work
XLXI_8 : FD
with ALTYS because of it high operating frequencies
port map (C=>XLXN_51, 500+MHz and existence of Gigabit Ethernet.
D=>XLXN_5,
Q=>XLXN_4);
XLXI_9 : INV
port map (I=>XLXN_4,
O=>XLXN_5);
XLXI_10 : FD
port map (C=>XLXN_4,
D=>XLXN_7,
Q=>XLXN_6);
XLXI_11 : INV
port map (I=>XLXN_6,
O=>XLXN_7);
XLXI_12 : FD
port map (C=>XLXN_6,
D=>XLXN_10, Fig.3 ALTYS Spartan 6 Board
Q=>XLXN_9);
XLXI_13 : INV
port map (I=>XLXN_9, III. EXPERIMENTAL SETUP
O=>XLXN_10);
The block scheme for measuring BER in FSO atmosphere
XLXI_14 : FD
channel can be seen at fig.4. It consists of Rx and Tx optical
port map (C=>XLXN_9, drivers, FSO atmosphere channel, counter device, BER
D=>XLXN_12, measuring scheme and pseudo random noise generator. The
Q=>XLXN_11); information is passed through atmosphere channels forward
and backward. At the end of the backward channel there is
XLXI_15 : INV BER measuring scheme, which compare signals from the
port map (I=>XLXN_11, generator and atmosphere channel. If signals are different the
O=>XLXN_12); scheme formed logical ones. Otherwise the scheme form logic
zeroes, which mean no error [3] .
XLXI_16 : FD
port map (C=>XLXN_11,
D=>XLXN_14,
Q=>XLXN_13);
XLXI_17 : INV
port map (I=>XLXN_13,
O=>XLXN_14);
XLXI_18 : FD
port map (C=>XLXN_13,
D=>XLXN_16,
Q=>XLXN_15);
35
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
V. CONCLUSION
IV. SIMULATION
REFERENCES
Fig.6 and Fig.7 shows computer simulations and real
oscillogram. In the upper part of the figures there is a PRNG [1] Beker H., P.Fred,The Protection of Communications. Wiley-
signal, while in the bottom of the figures there is a clock Interscience. p. 212. 1982.
signal [7]. [2] Pong P. Chu FPGA Prototyping by VHDL Examples: Xilinx
Spartan-3 Version (Feb 4, 2008)
[3] Kolev N., K. Dimitrov Y. Velchev T. Mitsev Experimental
Setup for BER Measuring of
Free Space Optical System , pp.214-217, Nis, Serbia , 2011.
[4] Anil K. Maini Defence Digital Electronics Principles, Devices
and Applications
Research and Development Organization (DRDO), India
[5] www.xilinx.com
[6] http://www.digilentinc.com/Products/Detail.cfm?NavPath=2,40
0,836&Prod=ATLYS
[7] Hartmann A. K. A practical guide to computer simulations
World Scientific Publishing Company; Pap/Cdr edition (March
30, 2009)
[8] Stamatios V. Kartalopoulos Optical Bit Error Rate: An
Estimation Methodology Wiley-IEEE Press 2004
36
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
37
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
14,00
TABLE II
12,00
Frequency, GHz k(f) α(f)
10,00 11,15 0,03485 1,04390
8,00 19,15 0,096502 1,00477
6,00
10,00 ACKNOWLEDGEMENT
5,00
This work was supported under Project Nr DUNK-01/03 –
0,00 12.09 “University Scientific and Research Complex for
0,00 10,00 20,00 30,00 40,00 50,00 60,00 70,00 80,00 Innovation and Transfer of Knowledge in Areas of
ITU Model Real Data corrected RR, mm/h Micro/Nano Technologies and Materials, Power Effectiveness
and Virtual Engineering”.
Fig. 2. Rain attenuation for 7,1 km radio link, f=19,15 GHz
REFERENCES
We assume the rain rate statistic is the same for the every
part of link distance, because the measurement period is long [1] V. Kvicera and M. Grabner, Results of long-term concurrent
enough. measurement of rain rate and rain attenuation at 38 GHz,
Fig.1 and Fig. 2 show the similar disposition of the Proceedings of 2002 URSI General Assembly, Maastricht,
drawings for theoretical and real rain attenuation of studied Netherlands, 17-24 August 2002.
radio link. Obviously the real attenuation is 1 dB for light rain [2] ITU-R Recommendation P.838-3 (03/05) Specific attenuation
and 3-4 dB for heavy rain bigger than the theoretical for two model for rain for use in prediction methods
studied frequencies. The correction obtained from Eq. (3) is [3] Alexandrova E., V. Sviatogor, V. Pozhidaev, A. Kavecki,
not the frequency dependent and the difference can be Results from experimental investigation on rain attenuation over
terrestrial radio links at frequencies 11,5, 19,3 and 29,3 GHz,
searched out in the specific rain attenuation calculation – Eq.
“Electropromishlenost i priborostroene”, vol. 7, 1989, pp. 15-19
(2). One of the possible reasons can be found in the rain drops [4] J. Seybold, Introduction to RF propagation, John Wiley & Sons
size distribution that is different for the rainfalls occur in Inc., Hoboken, New Jersey, 2005.
different time but with the same rain rate. That for example [5] R. L. Freeman, Radio System Design for Telecommunications,
causes serious differences in optical wave attenuation [6] and John Wiley & Sons Inc., Hoboken, New Jersey, 2007.
also can lead to different specific attenuation for the given [6] Colvero, C., M. Cordeiro, J. von der Weid, FSO Systems: Rain,
frequencies. That give us the ground to precise the Drizzle, Fog and Haze Attenuation from Different Optical
coefficients k(f) and α(f) in Eq. (2). Windows Propagation, International Microwave and
Optoelectronics Conference 2007, October 29 - November 1,
First it is calculated the specific attenuation value according
2007, Salvador, Brazil.
the real measured rain attenuation and then by using the same [7] Ferdinandov, E., B. Pachedjieva, Probability and Statistical
model based on Eq. (2) is obtained the new values of k(f) and Methods in Communications – Part 1, Siela, Sofia, 2005.
α(f). The smallest squares method is used [7]. [8] ITU-R Recommendation P.837-5. Characteristics of
precipitation for propagation modeling.
38
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
39
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
the high-pass part will belong to the actual wavelets, the low
pass one to the scaling functions; this can be further analyzed.
Downsampling is needed, thus the total number of expanding
coefficients remain constant after each step; cj-1 l and dj-1 l are
half as long as the starting cj l.
40
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
Nm = 10
signals.
Automatic measurement environment was prepared to
gather sufficiently large number of data vectors, at the
frequencies 93 MHz and 120 MHz. one hundred of
measurements were carried out and wavelet transformed. The Nm = 100
resulting coefficients varied a lot, as it is demonstrated in
Fig. 5.
IV. CONCLUSION
The normalized wavelet coefficients of the reference and
the multiple reflected signals can be distinguished in higher
frequencies, however, the low frequency terms are in
Fig. 5. The 5th wavelet transforms of 10 different signals from the
cable with multiple reflection points. approximately the same, at least in average. The sampling
time ts = 400ps of the two-channel oscilloscope is just about 4
In order to see the trends, the square of the coefficients djk to 5 refinement steps away from the 93-120 MHz carrier
were summarized for all the signals. The result’s square root frequency’s characteristic time, thus the high frequency
was normalized by the number of measurements, effects of the reflections and nonlinearities should be found in
the first couple of steps, thus our results meet the
expectations. Also, ts becomes commensurable with the 30 ns
41
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
burst time after 6-7 refinement steps, thus the lower frequency [2] C. K. Chui, An Introduction to Wavelets, (Academic, San
terms will contain mostly the burst itself. Multiple reflection Diego, 1992).
in conducted measurements can be characterized by a [3] S. Mallat, A theory for multiresolution signal decomposition:
significant increment in the average fine resolution wavelet the wavelet representation; IEEE Trans. Pattern Anal. Mach.
Intel., vol. 11, pp. 674-693 (1989).
coefficients. [4] J. Kaftan, A. A. Bell, C. Seiler, T. Aach, Wavelet based
denoising by correlation analysis for high dynamic range
imaging; IEEE International Conference on Image Processing,
Cairo, pp. 3857-3860. (2009).
ACKNOWLEDGEMENT [5] C. Christopoulos, A. Skodras, and T. Ebrahimi, IEEE Trans.
Consum. Electron. vol. 46, p. 1103 (2000).
This work was supported by the Hegedüs Gyula fellowship [6] K. Urban, Wavelet Methods for Elliptic Partial Differential
and the projects TÁMOP-4.2.1./B-09/1/KONV-2010-0003, Equations, Oxford University Press, Oxford, (2009).
and TáMOP 4.1.1.A-10/1/KONV-2010-0005 of the Széchenyi [7] W. Dahmen, Wavelet methods for PDEs—Some recent
István University. developments, J. Comput. Appl. Math. vol. 128, p. 133 (2001).
[8] J. Pipek, Sz. Nagy, Refinement trajectory and determination of
eigenstates by a wavelet based adaptive method, J. Chem. Phys.
REFERENCES vol. 125, 174107 (2006).
[9] M. Kuczmann, A. Iványi, Finite Element Method in Magnetics,
[1] I. Daubechies, Ten Lectures on Wavelets, CBMS-NSF Regional Academic Press, Budapest, 2008, ISBN: 978 963 05 8649 8.
Conference Series in Applied Mathematics 61 (SIAM,
Philadelphia, 1992).
42
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
1
III. MODEL OF THE MOBILE ENVIRONMENT
Tome Dimovski is with the Faculty of Technical Sciences at
University “St. Kliment Ohridski” of Bitola, Ivo Lola Ribar bb,
In this paper we consider system model for a mobile
Bitola 7000, Macedonia, E-mail: tome.dimovski@uklo.edu.mk.
2
Pece Mitrevski is with the Faculty of Technical Sciences at distributed environment consisting of a set of mobile hosts
University “St. Kliment Ohridski” of Bitola, Ivo Lola Ribar bb, (MHs) and a set of fixed hosts (FHs), presented in Fig. 1. The
Bitola 7000, Macedonia, E-mail: pece.mitrevski@uklo.edu.mk. model has two main parts: the fixed part of the network and a
43
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
mobile part of the network. Communication between the fixed V. CONNECTION FAULT-TOLERANT MODEL
part and the mobile part of the network is conveyed via
Mobile Support Stations (MSS). MSSs are connected to the
fixed part of the network via wired links. MHs can cross the A. Overview
border between two different geographical areas covered by
different MSSs. Some of the most frequent failures in mobile environments
are communication failures. When MHs are in motion, they
may exit the geographical area that is covered by some MSS
and the resources of the fixed participants may potentially be
blocked for an undefined period of time. If MHs do not
reestablish connection with any MSS the transaction is
aborted.
To minimize the number of mobile transaction aborts by
tolerating failures caused by network disconnections we
proposed Connection Fault-Tolerant (CFT) Model [8] for
distributed transaction processing in mobile computing
environment. The CFT Model ensures the atomicity property.
The CFT model considers two communication scenarios:
1. The first scenario is a Standard communication scenario
when MHs can directly connect to fixed network through
MSSs.
2. The second scenario is an Ad-hoc communication
scenario when MHs cannot directly connect to the fixed
network through any MSS. In this scenario MHs can ad-hoc
Fig. 1. Model of the Mobile Environment communicate with neighboring MHs to reach the fixed
network.
In the considered system model, first, MHs can In the Standard scenario, similar to [6], to minimize the use
communicate with the FHs through MSS via wireless of the wireless communication and conservation of the
channels only when they are located within the MSS coverage resources of MHs we assign a Mobile Host Agent (MH-Ag),
area. Second, the MHs can ad-hoc communicate with which we add in the fixed network, to each MH. We assume
neighboring MHs via wireless channels. When MHs enter a that in the execution of a transaction MH-Ag is representing
geographical area that is out of coverage of any MSS, to the MH in the fixed network and it acts as an intermediator
access database servers on fixed network they may connect between MH and the transaction CO. All communications
through a neighboring MH which is in the covering area of between MH and CO go through the MH-Ag. The MH-Ag is
any MSS. responsible for storing all the information related to the states
In our scenario, we consider mobile distributed of all MTs involving the MH. In the fixed network, a server or
environment where MHs can communicate with each other, or servers can be designated, where MH-Ag are created for each
with FHs through MSS, and MHs can ad-hoc communicate participating MH.
with neighboring MHs to reach fixed network. In our CFT model we define additional function to MH-Ag
We assume that database servers are installed on each FH, that we called Decision Algorithm (DAlg). DAlg is used
and each MH has a mobile database server installed. during the execution of a transaction when MH-Ag cannot
directly or ad-hoc communicates with its MH for a defined
period of time. DAlg’s task is to check if Transaction
IV.TRANSACTION MODEL Processing Fragment (TPF) function is write
(insert/update/delete) or read. If TPF function is write, DAlg
A distributed transaction where at least one MH participates saves the TPF in FIFO (First In First Out) queue list and
is called a Mobile Transaction (MT). We identify a MH where makes a decision for MH to send “Yes” vote to the transaction
a transaction is issued as a Home-MH (H-MH). Participating CO. When the connection between MH and corresponding
MHs and FHs in the execution of a mobile transaction are MH-Ag is reestablished, MH-Ag’s first task is to send all
called participant MHs (Part-MH) and participant FHs (Part- saved TPFs to the corresponding MH. If TPF function is read,
FH). DAlg will wait for connection reestablishment between MH
In our model we assume the existence of a Coordinator and corresponding MH-Ag, for a defined period of time. If the
(CO) which is responsible for coordinating the execution of connection is not reestablished in the specified time period,
the corresponding transaction. The CO is responsible for DAlg makes a decision for MH to send “No” vote to the
storing information concerning the state of the transaction transaction coordinator.
execution. Based on the information collected from the The second communication scenario is when MHs cannot
participants of the transaction, the CO takes the decision to directly connect to the fixed network, or MH-Ag cannot
commit or abort the transaction and informs all participants directly communicate with its MH through any MSS. In that
about its decision. The CO should be executed on the fixed case, they try to connect through ad-hoc communication with
host or hosts. That means logs will be kept more safely. any neighboring MH which is in the covering area of any
44
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
MSS. To allow this, we assign a MH-Relay Agent (MH-RAg) After the coordinator has received vote from every
to each MH. The MH-RAg is responsible for ensuring relay participant, it decides whether to commit or abort the
wireless link between neighboring MHs. This means that MH transaction. If, for any reason, even one of the participants
which is out of the coverage area can connect to his MH-Ag votes “No” or execution time–out expires, the coordinator
of the fixed network via MH-RAg of the neighboring MH decides to abort the transaction and sends “Abort” message to
which is in coverage area of any MSS. all participants. Otherwise, if all received votes are “Yes” and
execution time–out is not expired, the coordinator decides to
B. Connection Fault-Tolerant Model operation commit the transaction and sends “Commit” message, with
reset execution time–out to all participants. The participants
In this section we make a short review of the operation of need to acknowledge the coordinator decision before
the CFT model that has been presented in [8]. Fig. 2 execution time–out expires.
illustrates the execution of a mobile transaction for the
proposed model, but without the functions of the Decision VI.SIMULATION RESULTS AND ANALYSIS
Algorithm because in this paper our interest is concentrated on
the Ad-hoc communication impact on mobile transaction The simulation experiments study the impact of ad-hoc
execution. communication in CFT Model on the mobile transaction
If H-MH is connected to the fixed network through some commit rate. For the simulations, we used SimPy [9], a
MSS, it initiates a mobile transaction by sending transaction process-based discrete-event simulation package based on
processing fragment (TPF) to the coordinator through its standard Python programming language [10]. Table I
corresponding MH-Ag which acts as intermediator between summarizes our simulation parameters.
coordinator and MH.
Transaction coordinator computes the execution time-out TABLE I
( Et ), which is a time limit for all participants to complete the SIMULATION SETTINGS
execution of the TPFs and send a VOTE to coordinator. After Parameter Value
that coordinator sends Et and TPFs to all participating FHs Number of Part-MHs 5-10
and MH-Ags, asks them to prepare to commit the transaction, Fragment execution time (MH) 0.5s
and enters the wait state. MH-Ags try to send TPFs to their Fragment execution time (CO) 0.3s
participating MHs. If MH-Ag cannot communicate with a MH Transmission delay (wireless link) 0.4s
trough standard communication, it tries to connect through ad- Transmission delay (wireless ad-hoc link) 0.9s
hoc communication to any neighboring MH which is in the Transmission delay (wired link) 0.2s
covering area of any MSS. That function is assigned to the Disconnection Rate 0 - 95%
MH-Relay Agent. Ad-hoc support 0 - 80%
45
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
transaction commit rate. The ad-hoc communication impact is of committed mobile transactions and shows resilience to
higher for networks where disconnection rate is higher. connection failures of the mobile devices.
REFERENCES
[1] J. Gray, “Notes on Data Base Operating Systems”, Operating
Systems, An Advanced Course, 1978.
[2] N. Santos, P. Ferreira, “Making Distributed Transactions
Fig. 4. Impact of ad-hoc communication on Resilient to Intermittent Network Connections”, Proceedings of
commit rate (two groups) the 2006 International Symposium on on World of Wireless,
Mobile and Multimedia Networks. IEEE Computer Society,
Fig. 4 shows simulation results where MHs are classified in Washington, 2006.
two different groups that have different levels of ad-hoc [3] V. Kumar, “A Timeout-Based Mobile Transaction
support. It is evident that ad-hoc support improves the Commitment Protocol”, Proceedings of the East-European
transaction commit rate, but the percentage of improvement is Conference on Advances in Databases and Information
lower compared to the previous scenario where the level of Systems, 2000.
ad-hoc support was the same in each part of the wireless [4] N. Nouali, A. Doucet, H. Drias, “A Two-Phase Commit
Protocol for Mobile Wireless Environment”, Proc. 16th
network. Compared to the previous scenario, commit rate
Australasian Database Conference, 2005.
slightly decreases when the disconnection rate rises all the [5] B. Ayari, A. Khelil, N. Suri, “FT-PPTC: An efficient and fault-
way from 60 up to 95 seconds. tolerant commit protocol for mobile environments”, Proc. of
To present the influence of ad-hoc support in a highly SRDS, 2006.
dynamic wireless network, we classify all MHs in three [6] L. Xiang, Z. Yue-long, C. Song-qiao, Y. Xiao-li, “Scheduling
groups that have different levels of ad-hoc support. From the Transactions in mobile distributed real-time database systems”,
chart in Fig. 5, one can conclude that commit rate increment is Journal of Central South University of Technology, 2008.
not evident as before, e.g. the highest improvement of the [7] S.A. Moiz, M.K. Nizamudin, “Concurrency Control without
commit rate is about 11%. Locking in Mobile Environments”, First International
Conference on Emerging Trends in Engineering and
Technology, Nagpur, Maharashtra, 2008.
VII. CONCLUSIONS [8] T. Dimovski, P. Mitrevski, “Connection Fault-Tolerant Model
for distributed transaction processing in mobile computing
environment”, Information Technology Interfaces, 33rd
In this paper we made a short review of the operation of the
International Conference, Dubrovnik, Croatia, 2011.
Connection Fault-Tolerant Model [8] for mobile distributed [9] URL < http://simpy.sourceforge.net/>
transaction processing. It is developed to increase the number [10] URL < http://www.python.org/>
46
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
Abstract: This paper presents optimization method for synthesis of They perform robust optimization, no matter about the
generalized high order microwave filters with arbitrary topology. The starting point. Unfortunately the global optimizers such as
method utilizes local optimizer for coupling matrix determination. genetic or stochastic have very slow convergence to the cost
The synthesis procedure converges very fast as for a initial point is function minimum.
used a vector based on the Chebyshev all pole filter for the same
degree of the filter. To validate the proposed synthesis method two
This paper presents optimization method for synthesis of
numerical examples for resonant filters are computed. The frequency high microwave filters with arbitrary topology. The method
responses from the synthesis procedure and the theoretical responses uses Nelder-Mead local optimizer for coupling matrix
show excellent agreement. determination. The synthesis procedure converges very fast as
Keywords: microwave filter, Chebyshev filter, Nelder-Mead for a initial point is used a vector based on the Chebyshev all
optimization, coupling matrix. pole filter for the same degree of the filter. The cost function
is based on amplitude of the transmission and reflection
I. INTRODUCTION coefficient zeros and their values at the cut-off frequencies
and the reflection coefficient maxima. To validate the
Microwave coupled resonator filters play important role in proposed synthesis method two resonant filters are designed
the modern communication systems. The constraint with asymmetrical responses. The frequency responses from
RF/microwave spectrum requires high attenuation in the stop the synthesis procedure and the theoretical responses show
band and low insertion loss in the passband of the filters. excellent agreement.
These requirements can be met only by cross-coupled
microwave filters, realizing attenuation poles on finite II. RESONATOR FILTER CHARACTERISTICS
frequencies. Cross-coupled resonator filters allow using
various topologies with variety of frequency responses. The The synthesis procedure starts with the low-pass prototype
microwave filter modelling is very important for the fast and with normalized angular frequency of passband ω = 1 . The
accurate design. transfer and reflection coefficients may be expressed as a ratio
Key point in the obtaining of the coupling matrix of two N-th degree polynomials as follows:
corresponding to the practical filter topology is to convert its P (ω ) F (ω )
transversal form to folded form using matrix rotations. Most S21 = N , S11 = N (1),
of the matrix rotation sequences are given in [4]. It is noticed EN ( ω ) ε EN (ω )
that this method for synthesis suffers from generality, because where ω is real angular frequency and
the matrix rotations cannot be derived for every one practical
filter topology. Some of the matrix rotation sequences cannot (
ε = 1 10 RL 10
)
− 1 . ( FN (ω ) PN (ω ) )
ω =1
, RL is the prescribed
converge in order to find the coupling matrix. Some of the value of the return loss in dB, in the passband of the filter. It is
disadvantages in this method are solved if arrow form of the assumed that all polynomials are normalized to their highest
coupling matrix is used [5] or Pfitzenmeir method is used [6]. degree coefficient.
In many practical cases, it is necessary to define the filter The method of computing the numerator of the reflection
topology in order to satisfy some manufacturing or space coefficient is outlined in [3].
requirements. In this case, the exact solution is hard to be
FN (ω ) = ( GN (ω ) + GN′ (ω ) ) ,
1
found utilizing the conventional synthesis methods. (2),
2
One possible general solution to the filter design for where both polynomials can be represented by two
G N ( ω ) = U N ( ω ) + VN ( ω )
arbitrary topology is to apply direct local optimization over
polynomials: and
the coupling matrix with successive starting point. In the basic
papers proposed optimization method for coupling matrix GN′ ( ω ) = U N (ω ) − VN (ω ) . Both polynomials U N (ω ) ,
VN (ω ) can be arranged according to the Cameron's recursive
synthesis [7,8], the starting vector is set to arbitrary values.
This makes the local optimization very unstable method for
cost function minimization. Another method is to use global procedure in [3]. Obviously the roots of U N (ω ) corresponds
optimization method for finding the coupling matrix for reflection zeros, and the roots of VN (ω ) correspond to the in-
certain filter topology.
band reflection maxima.
Marin Veselinov Nedelchev and Ilia Georgiev Iliev –are with It can be easily found that the transfer coefficient may be
Dept. of Radiocommunication and Videotechnologies in Faculty of
expressed in the following way[3]:
Telecommunication in TU –Sofia, N8, Kliment Ohridski bul., 1700
1
Sofia, Bulgaria. E-mail: mnedelchev@tu-sofia.bg, igiliev@tu- S212 (ω ) = (3)
sofia.bg. 1 + ε C N (ω )
2 2
47
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
48
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
The reflection and transmission zeroes are calculated and The frequency response of the designed filter, calculated
summarized in Table 1. according to (6) and the coupling matrix derived in the
Table 1. Poles and zeros of asymmetric nine resonator filter optimization process, is shown on Fig.4. It is clearly seen that
№ Reflection zeros Transmission zeros Roots of VN the normalized cut off frequency is ωc = ±1 , while the
1 -j0.9880 -j1.8 -j0.9514 transmission zero frequencies are exactly
2 -j0.8888 -j1.4 -j0.7984
at ω p = −1.8, − 1.4, 1.3, 1.6 .The maximum value of the
3 -j0.6795 j1.3 j0.9566
4 j0.9893 j1.6 j0.8166 return loss is with the prescribed value of -20dB.
5 j0.8998 j0.5654
6 j0.7051 -j0.5331
7 j0.4006 j0.2164
8 -j0.3629 -j0.1752
9 j0.0211
The initial point for the coupling matrix elements for the
optimization procedure is to set the values of the all pole nine
resonator Chebyshev filter M S1 = M 9 L = 0.9876 ,
M 12 = M 89 = 0.9168 , M 23 = M 78 = 0.5870 ,
M 34 = M 67 = 0.5480 , M 45 = M 56 = 0.5372 .
Fig.4 Frequency response of nine resonator filter with asymmetric
response. Solid line-S21, dashed line- S11
49
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
Table 2. Poles and zeros of CQTfilter fast convergence of the cost function to a local minimum. In
№ Reflection Transmission zeros Roots of VN both cases this local minimum is found to be a global
zeros
1 j0.9892 -j2 j0.9566
minimum corresponding to general Chebyshev filter. In both
2 j0.9018 -j1.2 j0.8244 cases the starting point for the optimization process was the
3 j0.7246 j1.6 j0.6032 coupling matrix of classic Chebyshev filter. Starting from
4 -j0.9915 j2 -j0.9655 random initial point leads to a local minimum not
5 -j0.9201 -j0.8537 corresponding to Chebyshev filter.
6 -j0.7647 -j0.6530
7 -j0.5203 -j0.3696 IV. CONCLUSION
8 j0.4625 J0.3060 This paper presents optimization method for synthesis of
9 -j0.2057 -j0.0342
microwave filters with arbitrary topology of high order. The
10 j0.1385
method uses local optimization method for coupling matrix
The number of the independent values of the coupling determination. The synthesis procedure converges very fast as
matrix is 24 The optimization process converges fast in 238 for an initial point is used a vector based on the Chebyshev all
iterations of the optimizer with end cost function value pole filter for the same degree of the filter. To validate the
1.64519.10−7 . Fig. 6 shows the cost function value with respect proposed synthesis method two resonant filters are designed
to the iterations. with asymmetrical responses. Both presented examples show
fast convergence of the cost function to a local minimum. In
both cases this local minimum is found to be a global
minimum corresponding to general Chebyshev filter. The
frequency responses from the synthesis procedure are within
the expectations and found to be consistent with the
theoretical responses and given filter specifications.
REFERENCES
[1] A.E. Atia and A.E. Williams. "Narrow-Bandpass Waveguide
Filters." 1972 Trans. оn Microwave Theory and Techniques 20.4
(Apr. 1972 [T-MTT]): 258-265
Fig.6 Cost function value for asymmetric five resonator filter [2] Cameron, R., Advanced Coupling Matrix Synthesis Techniques
The coupling matrix derived in the optimization process is for Microwave Filters, IEEE Trans on MTT-50, Jan.2003, pp.1-10
given by (8). The corresponding frequency response [3] Cameron, R.J., General Coupling Matrix Synthesis Methods for
calculated by the coupling matrix and Eq.(6) is shown on Chebyshev Filtering Functions, IEEE Trans. On MTT, April 1999,
Fig.7. pp.433-442
[4] Rhodes, J.D., The Design and Synthesis of a Class of Microwave
Bandpass Linear Phase Filters, IEEE Trans on MTT 1969 pp.189-
204
[5] Macchiarella, G, An Analytical Technique for the Synthesis of
Cascaded N-Tuplets Cross-Coupled Resonators Microwave Filters
Using Matrix Rotations, IEEE Trans. On MTT May. 2005 pp.1693-
1698
[6] G. Pfitzenmaier, “Synthesis and realization of narrow-band
canonical microwave bandpass filters exhibiting linear phase and
transmission zeros,” IEEE Trans. Microwave Theory Tech., vol.
MTT-30, pp.1300–1311, Sep. 1982.
[7] Atia W.A., K.A. Zaki and A.E. Atia. "Synthesis of general
Fig.7 Frequency response of 10-th order CQT filter with
topology multiple coupled resonator filters by optimization." 1998
asymmetric response. Solid line-S21, dashed line- S11
MTT-S International Microwave Symposium Digest 98.2 (1998Vol.
As it is clearly seen from Fig.7, the transmission zeros are II MWSYM]): 821-824
placed on the prescribed values The maximum value of the [8] Amari, S., Synthesis of Cross-Coupled Resonator Filters Using
reflection coefficient is -20dB. Both presented examples show an Analytical Gradient-Based Optimization Technique, IEEE Trans
on MTT Sept. 2000, pp.1559-1564
0 0.9832 0 0 0 0 0 0 0 0 0 0
0.9832 −0.0019 0.6244 −0.5149 0 0 0 0 0 0 0 0
0 0.6244 0.7140 0.4020 0 0 0 0 0 0 0 0
0 −0.5149 0.4020 −0.0802 0.5442 0 0 0 0 0 0 0 (8).
0 0 0 0.5442 −0.0293 0.5266 0 −0.0427 0 0 0 0
0 0 0 0 0.5266 −0.012 0.5671 0 0 0 0 0
M =
0 0 0 0 0 0.5671 0.002 0.5267 0 0 0 0
0 0 0 0 −0.0427 0 0.5267 0.0157 0.5421 0 0 0
0 0 0 0 0 0 0 0.5421 0.0563 0.5093 0.3348 0
0 0 0 0 0 0 0 0 0.5093 −0.4770 0.7368 0
0 0 0 0 0 0 0 0 0.3348 0.7368 −0.0019 0.9832
0 0
0 0 0 0 0 0 0 0 0 0.9832
50
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
51
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
B. Test Implementation pulses that are unsymmetrically distributed to the mean value.
In such cases the value of the coefficient of variation is
Ability to generate random pulses can be used in cases of significantly greater than 30%, so the normal (Gaussian)
simulation study of the behavior of the electronic distribution is not applicable. Solution can be obtained by
communication equipment under close-to-real conditions. In using the distribution of Veybul, which can be described as:
such case it is necessary pulses to be generated with a
maximum close distribution as occurred in nature.
To check whether the model (2) is able to generate 0, q < qmin
trustworthy random pulses a statistical methods applied to the
sample of the generated pulses can be used. Preliminary
f (q ) =
. (8)
k q − q
k1 −1
q − q k1
studies performed on model (1) showed that it doesn’t give .1 min
. exp − min
, q > qmin
good results in a similar direction. k 2 k 2 k2
The generated pulses can be compared in their charge,
which can be determined by the following relation:
The values of coefficients k1 and k2 are determined by the
∞ following formulas:
Q= ∫ I (t ).dt ,
2
q q
(3) k1 = 0,111186 + 0,835597 + 0,0759898 ; (9)
σ σ
t =0 q q
1
1 n k1
1, q < qmin
which can be achieved by using the coefficient a. In this case
the unit charge will be for 1 coulomb per ampere (C/A), but it P(q ) = k1
;
can be denoted q.
exp− q − q (11)
min
, q q
k 2
A statistical evaluation of the resulting set of normalized > min
charges has to be made. For this purpose we calculate the
average value, the dispersion (variation) and the coefficient of
variation respectively on dependencies (5) (6) and (7), where
n is the number of random pulses in the sample.
III. RESULTS
n
1
q= ∑ qi
n i =1
(5)
Using the software environment MATLAB [8] simulations
of the probability distribution obtained with the dependence
(2) models of high-voltage disturbing impulses were made.
Using a random number generator values are given to the
1 n
σ q = ∑ [ (qi − q ) ] (6)
coefficients b and c, as Table I indicates the intervals of their
variation.
n i =1
TABLE I
σq COEFFICIENT VALUES
vq = (7)
q Coefficient 10/350 µs 8/20 µs Random
52
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
In Table I the values of the coefficients b and c, in case of electrostatic discharge, that breakthrough occurs when they
pulses corresponding to the standard 10/350 µs and 8/20 µs, reach a certain critical value of the charge.
are shown. They are the boundary and the distribution of
random values in these intervals is given by equal probability
law.
Fig. 1 shows a family of randomly generated curves, for
clarity of the image their number was reduced to 10. There are
variously shaped pulses with different slope of the forefront
and rear front respectively integrand area, respectively,
different relative charge.
TABLE II
STATISTICAL PARAMETERS
53
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
IV. CONCLUSION
From the foregoing it can be drawn:
Fig. 4. Worlds Lightning Strike Density - The mathematical model of high-voltage disturbing
pulse described by dependence (2) can be used to
Using the diagram of Fig. 3 the number of pulses with a generate random pulses to take into account stochastic
relative charge greater than or equal to a value per square character in nature;
kilometer within one year can be determined. In Table III are - The probability distribution of occurrence of disturbing
given the relative charges of the three main types of disturbing pulses to a particular relative charge meets the reality;
impulses. The same table gives the average number of - It is appropriate to experimentally confirm the
impulses exceeding that charge per square kilometer within simulation results, and compared with actual statistics
one year and the average time between the occurrence of two on lightning activity and its consequences.
pulses with exceeding relative charges per square kilometer.
These values are calculated for Bulgaria.
TABLE III
REFERENCES
YEAR LIGHTNING ACTIVITY
[1] IEC 60060, High-voltage test techniques.
[2] IEC 61312, Protection against LEMP.
10/350 µs 0,25/100 µs 8/20 µs [3] Maceika K., Lightning Protection of Electronic Data Processing
Systems, Scientific Proceedings of RTU. Series 7.
Relative Telecommunications and Electronics, 2003, vol.3.
charge, 4,399 1,326 0,166 [4] Gamlin M., Impulse current testing, Lightning Protection Forum
Shanghai, June 2004.
x10-4 C/A
[5] Hasse P., Overvoltage protection of low voltage systems, The
Institution of Electrical Engineers, London, 2000.
Number of [6] Каменов О., Висша математика, Част І, Издателство “Ciela”,
impulses for София, 2001.
0,002 0,7 5,8
1 km2 per [7] Angelov K., Model of Highvoltage Interferential Impulses,
year International Scientific Conference UNITECH 2010,
Proceedings vol. 1 (pp 286), 19-20 November 2010, Technical
Time between University Of Gabrovo.
[8] MATLAB IMAGE PROCESSING TOOLBOX. User's Guide,
impulses for "The Math - Works Inc.", 2000. www.mathworks.com.
182 500 521 62
1 km2, [9] Kauffman G.M., Using commercial lightning protectors in
days defense applications, RF Design Magazine, 2005, pp.16-21,
www.rfdesign.com.
[10] Spiner GmbH, Muenchen, Deutschland, www.spiner.de.
54
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
I. INTRODUCTION
II. OPTICAL PROPAGATION AND INTENSITY
The application of FSO systems is becoming more and DISTRIBUTION. DEFINITION OF THE PROBLEM
more frequent with specific connection conditions in the
contemporary communication systems and networks. This is In the selected location of the FSO system and a perfect
due to their wide bandwidth, tight radiation pattern of antenna, optical setting, that is a coincidence of the optical antennae
small size and weight, lower price, license free frequency axes of the opposite transmitter/receiver sets, angle θ = 0. The
band, that is, no frequency planning is necessary. The BER value with a perfect setting usually reaches values lower
increased interest in FSO systems, however, creates new than 10-20, when the values for normal functioning of the FSO
requirements for improvement of their characteristics, as well systems are within the range of 10-12 to 10-8. This allows,
as for optimizing some of their parameters, in particular those when the source power remains the same, for an increase of
of the divergence of the transmitter optical radiation [1-4]. the divergence of the transmitter θt, and in this case there is an
One of the reasons for decreasing the functioning reliability increase in the value of the maximum acceptable angle
of FSO systems are the random angle fluctuations of the deviations θmax of the laser beam from its main direction when
transmitter laser beam from the direction where the receiver is the condition is fulfilled that the received power Φr is bigger
placed. The main reasons for their existence are the turbulent than the threshold value Φr, min, respectively the minimal
fluctuations in the atmosphere and the mechanical movements average radiation intensity in the receiver aperture Ιr is bigger
of the bases on which the transmitter/receiver sets are placed than Ir, min (fig.1). With the further increasing of θt we reach
(or building sway) [5-7]. The phenomena mentioned have the maximum value of θmax when the installation and
parameters of the system are fixed, and then θmax starts
1
decreasing and we derive Φr < Φr, min , including the case
Tsvetan Mitsev is with the Faculty of Telecommunications at where the angle is θ = 0.
Technical University of Sofia, 8 Kl. Ohridski Blvd., Sofia 1000,
Bulgaria, E-mail: mitzev@tu-sofia.bg. As it is evident fig.1, for the derivation of the optimum
2
Nikolai Kolev is with the Faculty of Telecommunications at laser beam divergence of the transmitter θt, opt, where on
Technical University of Sofia, 8 Kl. Ohridski Blvd., Sofia 1000,
certain conditions we derive the maximum value of θmax, we
Bulgaria.
3
Hristo Ivanov is with the Faculty of Telecommunications at
need an intensity distribution model of the light of the source
Technical University of Sofia, 8 Kl. Ohridski Blvd., Sofia 1000, in the receiver antenna plane. This means that at a distance z
Bulgaria. from the transmitter in a plane transverse to the distribution
4 with a assumption for azimuthally beam symmetry, we have
Kalin Dimitrov is with the Faculty of Telecommunications at
Technical University of Sofia, 8 Kl. Ohridski Blvd., Sofia 1000, to derive the radial distribution of the plane density of the
Bulgaria, E-mail: kld@tu-sofia.bg. power I(ρ, z) ≡ I(θ, z). This distribution depends mainly on the
55
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
4,0.10 When the conditions (1) and (2) are fulfilled, the current
3,5.10-3 Gaussian radius is calculated by the formula
56
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
Φ pd ( θ , z ) = π. τ r . R r2 . I ( θ , z ) . (9) 1000
SNR
In (9) Rr is the aperture radius of the receiver telescope, τr is
the transmission coefficient of the optical receiver system. θt,1<θt,2<θt,3<θt,4
The above equation is true when the condition ρ z ( z ) >> R r 100
is fulfilled. θt,2
θt,3
The second in significance input optical beam, that is the
background one, is calculated by the formula SNRth θt,4
10
Φ B = π 2 τ r L λ ,B ( λ 0 ) R r2 θ 2r,exp ∆λ F , (10)
0,8 ΦL=10mW
III. SIMULATION RESULTS AND DISCUSSIONS
0,6
For the developed and implemented in TU-Sofia FSO
system [9], [10] we will determine the maximum divergence 0,4
θt, opt of the transmitter optical beam. The system works at a
wavelength λ0 = 850 nm with information throughput CI = 0,2
100 Mbps with power in the optical bit impulse ΦL = 10 mW.
Using a two-lens Kepler collimator, we gradually change the 0
beam divergence within the range of 1 mrad to 5 mrad. The 0 0,5 1,0 1,5 2,0 2,5 3
connection channel length is up to 2 km. The other system θt [mrad]
parameters necessary for the calculation using the method θt, opt
developed in ІІ, are: τt = 0,85; Kθ = 10; Rr = 5,5 cm; θr = 5
mrad; τr = 0,85; η(λ0) = 0,7; ∆λF = 10 nm; RFb = 1 kΩ; A = 5. Fig.3. Dependence θmax (θt) at z = 2 km for three values of ΦL.
For the calculations we choose values SM = 10 km, Lλ,B = 10-2 Determination of θt, opt (ΦL = 10 mW).
W/m2.sr.Å, T = 300 K, and the constants are kB = 1,38.10-23
J/K, e = 1,602.10-19 C. that when the power ΦL increases, θmax increases, too. From
the graphics it is evident that if we want to have the maximum
In fig.2, with an increasing divergence θt, exp of the value of θmax, it is necessary to change θt too, this means that
transmitter beam, we have shown the dependence SNR(θ). It its optimum value exists and it is θt, opt. When ΦL
is evident that, when we choose a minimal level for the increases two times and with an optimum value of the
signal/noise ratio SNRth = 11,2, which corresponds to BER ≈ transmitter optical beam divergence, the maximum possible
10-8, the maximum possible divergence of the beam θmax from angle beam divergence increases by 37%. It is also evident
the perfect alignment increases with the increasing of θt in the
57
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
from the graphics that θmax, depending on ΦL, undergoes more that the values θmax(θt, opt) increase when ΦL increases and
significant changes with the great values of θt. they decrease when z increases, and the connection channel
length z has a greater impact on them. When there is a
2,5 constant collimation of the transmitter beam, that is a constant
θmax [mrad]
1,0 z = 2km
ACKNOWLEDGEMENT
0,5
This work has been supported by the Research Programme
of the Technical University of Sofia, Bulgaria, Internal
0 Projects 2011, contract Nb 112pd033-07.
0 1 2 3 4 5
θt, opt θt [mrad]
REFERENCES
Fig.4. Dependence θmax(θt) at ΦL = 10mW for three values of z. [1] Ts. Mitsev, K. Dimitrov, B. Bonev, “Influence of Laser Beam
Determination of θt,opt(z = 1 km). Divergency on Free Space Optic Systems Functionality”,
TELECOM’2008, Conf. Proc., Varna, Bulgaria, 2008.
[2] Zh. Zhao, R. Liao, Y. Zhang, “Impact of Laser Beam Deverging
In fig.4 is shown the dependence θmax(θt) for three Angle on Free-Space Optical Communications”, Aerospace
connection channel lengths z = [1, 1,5, 2] km when the optical Conference, IEEE, pp. 1-10, 2011.
[3] A. Farid, S. Hranilovic, “Outage Capacity Optimization for
radiation source power is ΦL = 10 mW. With the decreasing Free-Space Optical Links with Pointing Errors”, Journal of
of the distance z is necessary a significant readjustment of the Lightwave Technology, Vol. 25, Issue 7, pp. 1702-1710, 2007.
transmitter optical system, but as a result we can achieve a [4] Y. Ren, A. Dang, B. Luo, H. Guo, „Capacities for Long-
significant improvement of the functioning abilities of the Distance Free-Space Optics Links Under Beam Wander
system. When z is decreased 2 times, it is necessary to Effects“, Photonics Technology Letters, IEEE, vol. 22, issue 14,
increase θt by almost 3 times in order to maintain the optimum pp. 1069-1071, 2010.
setting of the system. As a result, however, the possibilities of [5] Shlomi Arnon, “Effects of Atmospheric Turbulence and
divergence of the beam from the main direction and keeping Building Sway on Optical Wireless Communication Systems”,
Opt. Lett., vol. 28, No. 2, pp. 129-131, 2003.
the functioning of the system, are more than 2,2 times greater. [6] E. Ferdinandov, B. Pachedjieva, B. Bonev, Sl. Saparev, “Joint
In the comparisons between fig.3 and fig.4 it is evident that Influence of Heterogeneous Stochastic Factors on Bit-Error
the functioning of the system is more sensitive to the change Rate of Ground-to-Ground Free-Space Laser Communication
Systems”, Optics Communications, vol. 270, issue 2, pp. 121-
in the connection channel length that it is to the optical
127, 2007.
radiation source power. When the values of the optical [7] Bonev B., Relative Influence of Some Stochastic Factors on Bit-
radiation divergence are θt < 1 mrad, the impact of the Error Rate of Ground-to-Ground Free Space Optics, ICEST
changing of z or of ΦL on θmax can be ignored. 2007, Vol. 1, pp. 203-206, Ohrid, Macedonia, 2007.
[8] E. Ferdinandov, B. Pachedjieva, K. Dimitrov, Optical
Communication Systems, Sofia, Technika, 2007.
IV. CONCLUSION [9] Ts. Mitsev, N. Kolev, K. Dimitrov, “Optical Wireless
Communication System”, XII-th International Scientific
This paper shows the possibility of a significant increase in Conference SMOLJAN-2010, Smoljan, Bulgaria, 26-27 June
the functioning and reliability of an FSO system with an 2010.
optimum optical radiation divergence setting of the transmitter [10] N. Kolev, “Selection of optimal settings depending on the FSO
system parameters", XIII International PhD Workshop OWD
θt, opt. Its value depends on the particular parameters of the
2011, Conf. Proc., vol. 29, pp. 467-472, Warsaw, 2011.
system and the communication channel. We have researched
the impact of the connection channel length z and the power in
the code impulse of the optical radiation of the source ΦL on
the maximum possible divergence θmax of the transmitter
beam from the perfect direction, that is when there is a
location on single optical axis of the opposite
transmitter/receiver antennae θ = 0 (fig.2). We have shown
58
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
59
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
defining the duration of its oscillation and thus the width of proportionally, while the oscillating frequency decreases
the pulse generated at the oscillator output. The switched ring (f0=1/T), and vice versa. For the smallest NMOS and PMOS
oscillator frequency defines position of the transmitted pulse transistors (transistor width/length: W/L=25μm/0.18μm), the
spectrum within the FCC mask [8]. Since in the IR-UWB oscillation frequency of 3.95 GHz has been obtained. To
communication the time domain pulse width roughly utilize the whole UWB band more effectively, the center
determines the width of the generated frequency spectrum [8], frequency of at least 6 GHz is required. Higher ring oscillator
it is important to design a pulse, which makes optimal usage frequency could be achieved without PMOS transistor M5.
of the available spectrum, within the limits imposed by the However, this transistor provides the identical oscillation start
FCC. The buffer isolates the ring oscillator from the pulse from the initial state, defined by connecting A’ (B) node to
shaping filter loading and improves the pulse generator Vdd at the falling edge of the on-off signal.
current driving capability. The band-pass filter additionally
accommodates the pulse in the allowed FCC spectral mask. A. Influence of the NMOS and the PMOS transistors bulk
The switched ring oscillator topology is shown in Fig. 2. It resistors
is composed of the three-stage ring oscillator (M1 – M3
inverters stages) and a pair of oscillation-enabling switches
The bulk (substrate) terminals of the transistors are floated
(transistors M4 and M5). Due to its simplicity and short
to improve the performance of CMOS SPST (single pole
start-up time, the ring oscillator is the most used architecture single throw) and SPDT (single pole double throw) switches,
in the IR-UWB transmitter applications. It has small especially the power-handling ability and insertion loss, in
resistance at each feedback nod which allows fast transient
[9] − [10], respectively. The series transistor particularly
response.
played an important role in the switch’s insertion loss, while
The oscillation-enabling switches, as their name says,
the shunt transistors enhanced the isolation when the switch
control the oscillation process. When the on-off signal
was turned off. To improve the ring oscillator performance,
(produced by the glitch generator) is high, M4 is turned on the method that uses the resistors placed in the inverter stages
(M5 is turned off), the inverters stages M1 – M3 outputs have
transistors bulk terminals is investigated in the paper. First,
initial voltage values determined by the size ratio of the
the bulk resistors connected to ground are inserted in the ring
corresponding PMOS and NMOS transistors. Due to the small
oscillator inverter NMOS transistors, shown in Fig. 3.
inverter reactance, the oscillation can start immediately.
Transistor M5 is turned on (M4 is turned off) at the on-off
signal low level, connecting the M1 stage output (the M2 stage
input) to Vdd, and effectively shutting down the oscillations.
As the ring oscillator is switched off by M4 transistor during
the inactive period of time, the power consumption is
minimized.
60
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
f 0 (GHz)
4,13
body effect parameter, tox is oxide thickness, εox is oxide
Bulk resistors in NMOS transistors
permittivity, εsi is silicon permittivity, NA is a doping
4,08 Bulk resistors in PMOS transistors
concentration, and q is the charge of an electron. With
increase in the NMOS transistor bulk resistors value, due to
4,03
the small substrate current the NMOS bulk voltage becomes
slightly positive with respect to the source (the NMOS 3,98
body-source junction is forward biased), resulting in a low VtN 1 2 3 4 5
voltage drop. This leads to increase in the current discharging R b (kΩ)
the ring oscillator output and internal node capacitances. As a Fig. 6. Dependence of the ring oscillator frequency on the NMOS
result, the period of reaching the peak values is decreased and and PMOS transistors substrate resistors value.
the ring oscillator frequency is increased. Dominant effect
represents reduction in the bulk parasitic capacitance current oscillating frequency was increased from 4.1 GHz to
caused by increase in the substrate resistors value. With 4.25 GHz in case of the NMOS substrate resistors, while f0
decrease in the bulk parasitic currents, more current is parameter was in the range from 4 GHz to 4.25 GHz for the
available for the inverter output capacitance discharging and PMOS bulk resistors method. It can be noticed that for lower
thus the f0 parameter rises. substrate resistor values, the higher oscillation frequency was
In the second case, the resistors tied to Vdd are introduced as obtained in the former technique. Furthermore, the f0 – Rb
the PMOS transistor substrate resistors, Fig. 5. Since the curves go into saturation for the bulk resistor values higher
influence on the ring oscillator performance was nearly the than 3 kΩ in both cases.
same as presented in the simulation above (increase in the
PMOS bulk resistors reduces the PMOS threshold voltage VtP B. Influence of the substrate resistors placed in each ring
and/or decreases the substrate parasitic capacitance currents oscillator inverter stage transistor
leading to increase in the current charging the ring oscillator
output and internal node capacitances), the output voltage To further increase the ring oscillator frequency the bulk
waveform are not given here. However, simulated f0 values resistors are introduced in each inverter transistor, shown in
for both approaches are summarized in Tables I, and Fig. 7. Influence of the Rb value on the ring oscillator
presented in Fig. 6. Varying Rb from 0.4 kΩ to 5 kΩ, the
Fig. 5. The ring oscillator with PMOS bulk resistors architecture. Fig. 7. The ring oscillator with bulk resistor in all inverter’s
transistors topology.
61
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
4,58
REFERENCES
4,48
[1] M. Ghavami, L. B. Michael, and R. Kohno, Ultra Wideband
4,38 Signals and Systems in Communications Engineering, John
f 0 (GHz)
62
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
63
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
present work new Wi-Fi (IEEE 802.11 b,g) results arise, using The results were obtained in batch mode and written as
personal mode WPA, through OSI levels 4 and 7. data files to the client PC disk. Each PC had a second network
Performance is evaluated in laboratory measurements of WPA adapter, to permit remote control from the official IP
point-to-point links using new available equipments. University network, via switch.
Comparisons are made to corresponding results obtained for
open links.
The rest of the paper is structured as follows: Chapter II
III. RESULTS AND DISCUSSION
presents the experimental details i.e. the measurement setup
and procedure. Results and discussion are presented in The access point and the PC wireless network adapter were
Chapter III. Conclusions are drawn in Chapter IV. manually configured, for each standard IEEE 802.11 b, g,
with typical fixed transfer rates (1, 2, 5, 11 Mbps for 802.11b;
6, 9, 12, 18, 24, 36, 48, 54 Mbps for 802.11g). For every fixed
II. EXPERIMENTAL DETAILS transfer rate, data were obtained for comparison of the
laboratory performance of the WPA and Open links at OSI
The measurements used a D-Link DAP-1522 bridge/access layers 1 (physical layer), 4 (transport layer) and 7 (application
point [12], with internal PIFA *2 antenna, IEEE 802.11 layer) using the setup of Fig. 1. For each standard and every
a/b/g/n, firmware version 1.31 and a 100-Base-TX/10-Base-T nominal fixed transfer rate, an average TCP throughput was
Allied Telesis AT-8000S/16 level 2 switch [13].The wireless determined from several experiments. This value was used as
mode was set to access point mode. The firmware from the the bandwidth parameter for every corresponding UDP test,
manufacturer did not make possible a point-to-point link with giving average jitter and average percentage datagram loss.
a similar equipment. Therefore, a PC was used having a At OSI level 1, noise levels (N, in dBm) and signal to noise
PCMCIA IEEE.802.11 a/b/g/n Linksys WPC600N wireless ratios (SNR, in dB) were monitored and typical values are
adapter with three internal antennas [14], to enable a PTP link shown in Fig. 2 and Fig. 3, for open and WPA links, and
to the access point. In every type of experiment, interference 802.11b, g, respectively.
free communication channels were used (ch 8 for 802.11b,g). The main average TCP and UDP results are summarized in
This was checked through a portable computer, equipped with Table I, both for WPA and open links. In Fig. 4 polynomial
a Wi-Fi 802.11 a/b/g/n adapter, running NetStumbler software fits were made to the 802.11b, g TCP throughput data for
[15]. WPA personal encryption was activated in the AP and WPA links, where R2 is the coefficient of determination. It
the PC wireless adapter using AES and a shared key with 26 was found that the best TCP throughputs are for 802.11 g, for
ASCII characters. The experiments were made under far-field every link type. The 802.11 b, g average data are reasonably
conditions. No power levels above 30 mW (15 dBm) were close for both link types. The best average 802.11g TCP
required, as the access points were close. throughput is for open links. In Figs. 5-7, the data points
A laboratory setup has been planned and implemented for representing jitter and percentage datagram loss were joined
the measurements, as shown in Fig. 1. At OSI level 4, by smoothed lines. Concerning jitter it was found that, on
measurements were made for TCP connections and UDP average, the best jitter performances are for 802.11 g for both
communications using Iperf software [16]. For a TCP link types. For each standard, jitter performances agree
connection, TCP throughput was obtained. For a UDP reasonably well within the experimental errors. However
communication with a given bandwidth parameter, UDP average jitter for 802.11 b is slightly higher for WPA (5.5+-
throughput, jitter and percentage loss of datagrams were 0.2 ms) than for Open links (5.3+-0.3 ms), meaning that in
determined. Parameterizations of TCP packets, UDP this case increasing security leads to a minor degradation of
datagrams and window size were as in [10]. One PC, with IP jitter performance. Fig. 7 shows percentage datagram loss
192.168.0.2 was the Iperf server and the other, with IP data. Except for 802.11 g, where the highest value is for
192.168.0.6, was the Iperf client. Jitter, representing the WPA, no significant sensitivities were found for most data
smooth mean of differences between consecutive transit (1.4 % on average), within the experimental errors, either to
times, was continuously computed by the server, as specified standard or link type.
by the real time protocol RTP, in RFC 1889 [17]. The scheme At OSI level 7 we measured FTP transfer rates versus
of Fig. 1 was also used for FTP measurements, where FTP nominal transfer rates configured in the access point and the
server and client applications were installed in the PCs with PC wireless network adapter for IEEE 802.11 b, g as in [10].
IPs 192.168.0.2 and 192.168.0.6, respectively. The server PC The results show the same trends found for TCP throughput.
also permitted manual control of the settings in the access Generally, except for 802.11g TCP throughput, 802.11 b
point. jitter and 802.11g percentage datagram loss, the results
The server and client PCs were HP nx9030 and nx9010 measured for WPA links were found to agree, within the
portable computers, respectively, running Windows XP. They experimental errors, with corresponding data obtained for
were configured to optimize the resources allocated to the Open links.
present work. Batch command files have been written to
enable the TCP, UDP and FTP tests.
64
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
TABLE I
Average Wi-Fi (IEEE 802.11 b,g) results; WPA
and Open links.
Link
WPA Open
type
Parameter/
IEEE 802.11b 802.11g 802.11b 802.11g
standard
TCP
2.9 13.4 3.0 14.5
throughput
+-0.1 +-0.4 +-0.1 +-0.4
(Mbps)
UDP-jitter 5.5 2.3 5.3 2.3
(ms) +-0.2 +-0.1 +-0.3 +-0.1
UDP-%
1.2 1.8 1.2 1.2
datagram
+-0.2 +-0.2 +-0.2 +-0.1
loss
FTP
280.2 1450.6 289.9 1526.9
transfer rate
+-11.2 +-58.0 +-11.6 +-61.1
(kbyte/s)
Fig. 1- Laboratory setup scheme.
Fig. 2- Typical SNR (dB) and N (dBm); 802.11b;WPA and open Fig. 4- TCP throughput versus technology and nominal transfer rate;
links. WPA links.
Fig. 3- Typical SNR (dB) and N (dBm); 802.11g; WPA and open Fig. 5- UDP - jitter results versus technology and nominal transfer
links. rate; WPA links.
65
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
ACKNOWLEDGEMENT
Supports from Universidade da Beira Interior and FCT
(Fundação para a Ciência e a Tecnologia)/PEst-
OE/FIS/UI0524/2011 (Projecto Estratégico-UI524-2011-
2012) are acknowledged.
REFERENCES
[1] Web site http://standards.ieee.org Web site; IEEE 802.11a,
802.11b, 802.11g, 802.11n, 802.11i standards.
[2] J. W. Mark, W. Zhuang, Wireless Communications and
Networking, Prentice-Hall, Inc., Upper Saddle River, NJ, 2003.
[3] T. S. Rappaport, Wireless Communications Principles and
Practice, 2nd ed., Prentice-Hall, Inc., Upper Saddle River, NJ,
2002.
Fig. 6- UDP - jitter results versus technology and nominal transfer [4] W. R. Bruce III, R. Gilster, Wireless LANs End to End, Hungry
rate; open links. Minds, Inc., NY, 2002.
[5] M. Schwartz, Mobile Wireless Communications, Cambridge
University Press, 2005.
[6] N. Sarkar, K. Sowerby, “High Performance Measurements in
the Crowded Office Environment: a Case Study”, In Proc.
ICCT’06-International Conference on Communication
Technology, pp. 1-4, Guilin, China, 27-30 November 2006.
[7] E. Monteiro, F. Boavida, Engineering of Informatics Networks,
4th ed., FCA-Editor of Informatics Ld., Lisbon, 2002.
[8] J. A. R. Pacheco de Carvalho, P. A. J. Gomes, H. Veiga, A. D.
Reis, ”Development of a University Networking Project”, in
Encyclopedia of Networked and Virtual Organizations, Goran
D. Putnik, Maria Manuela Cunha, Eds. Hershey, PA
(Pennsylvania): IGI Global, pp. 409-422, 2008.
[9] J. A. R. Pacheco de Carvalho, H. Veiga, P. A. J. Gomes, C. F.
Ribeiro Pacheco, N. Marques, A. D. Reis, “Wi-Fi Point-to-
Point Links- Performance Aspects of IEEE 802.11 a,b,g
Laboratory Links”, in Electronic Engineering and Computing
Technology, Series: Lecture Notes in Electrical Engineering,
Fig. 7- UDP – percentage datagram loss versus technology and Sio-Iong Ao, Len Gelman, Eds. Netherlands: Springer, 2010,
nominal transfer rate; WPA links. Vol. 60, pp. 507-514.
[10] J. A. R. Pacheco de Carvalho, H. Veiga, N. Marques, C. F.
Ribeiro Pacheco, A. D. Reis, Wi-Fi WEP Point-to-Point Links-
IV. CONCLUSION Performance Studies of IEEE 802.11 a,b,g Laboratory Links, in
Electronic Engineering and Computing Technology, Series:
A new laboratory setup arrangement has been planned and Lecture Notes in Electrical Engineering, Sio-Iong Ao, Len
implemented, that permitted systematic performance Gelman, Eds. Netherlands: Springer, 2011, Vol. 90, pp. 105-
measurements of new available wireless equipments (DAP- 114.
[11] J. A. R. Pacheco de Carvalho, N. Marques, H. Veiga, C. F.
1522 access points from D-Link and WPC600N adapters from
Ribeiro Pacheco, A. D. Reis, ”Experimental Performance
Linksys) for Wi-Fi (IEEE 802.11 b,g) in WPA point-to-point Evaluation of a Gbps FSO Link: a Case Study”, Proc. WINSYS
links. 2010- International Conference on Wireless Information
Through OSI layer 4, TCP throughput, jitter and percentage Networks and Systems, pp. 123-128, Athens, Greece, 26-28 July
datagram loss were measured and compared for WPA and , 2010.
open links. Generally, except for 802.11g TCP throughput, [12] Web site http://www.dlink.com; DAP-1522 wireless
802.11 b jitter and 802.11g percentage datagram loss, where bridge/access point technical manual.
increasing security encryption was found to degrade [13] Web site http://www.alliedtelesis.com; AT-8000S/16 level 2
performances, the results measured for WPA links were found switch technical data.
[14] Web site http://www.linksys.com; WPC600N notebook adapter
to agree, within the experimental errors, with corresponding
user guide.
data obtained for Open links. [15] Web site http://www.netstumbler.com; NetStumbler software.
At OSI layer 7, FTP performance results have shown the [16] Web site http://dast.nlanr.net; Iperf software.
same trends found for TCP throughput. [17] Network Working Group. “RFC 1889-RTP: A Transport
Additional performance measurements either started or are Protocol for Real Time Applications”, http://www.rfc-
planned using several equipments, security settings and archive.org
experimental conditions, not only in laboratory but also in
outdoor environments involving, mainly, medium range links.
66
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
67
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
TABLE I TABLE II
EVALUATION METRICS SERVICE USAGE SERVICE QUALITY PARAMETERS
68
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
layer. V is the set of the customer attribute parameters. The TABLE III
value of f (uj, ai) indicates the value of uj about ai. INVESTIGATION RESULTS – GROUPS “TEACHERS”,
The significant attributes analysis is solved by fuzzy “ADMINISTRATION”, “STUDENTS”
clustering [8]. The process of the analysis includes the
Teachers Administration Students
following steps: N Objecti Attribu Objecti Attribut Object Attribute
Step1. Calculate the similarity matrix for the attributes. The o. ves tes ves es ives s
pair-wise comparison method is used to obtain the values of 1 S1 - 57 S11 – 31 S1 - 76 S11 – 44 S1 - 87 S11 – 54
the corresponding element aij, where (i=1,2, …,k and j=i+1, S12 – 11 S12 – 21 S12 – 43
i+2,…,i+(k-1)). The values of aji are obtained as 1-aij. Here k S13 – 5 S13 – 31 S13 – 56
S14 – 24 S14 – 25 S14 – 44
is the number of the attributes for the corresponding objective. S15 – 55 S15 – 48 S15 – 48
Step2. Calculate the fuzzy similarity matrix R. As shown in 2 S2 - 78 S21 – 77 S2 - 89 S21 – 69 S2 - 92 S21 – 88
equation (1) the research adopts the cosine distance measure S22 – 65 S22 – 75 S22 – 74
as the method of similarity measurement of the study objects. S23 – 71 S23 – 77 S23 – 70
m 2 m m
S24 – 45 S24 – 58 S24 – 66
(1) S25 – 76 S25 – 82 S25 – 87
r =
ij ∑
k =1
( a aik ) /
jk a 2∑
i=1
a 2
ik ∑
j=1
jk
3 S3 – 100 S31 – 99 S3 – 100 S31 – 90 S3 – 100 S31 – 100
S32 – 93 S32 – 75 S32 – 98
During the study the calculation of the fuzzy similarity S33 – 45 S33 – 80 S33 – 100
matrix R using Euclidian Distance measure was performed as 4 S4 - 14 S41 – 7 S4 - 2 S41 – 1 S4 - 34 S41 – 13
S42 – 11 S42 – 2 S42 – 12
well. The results obtained where almost the same and will be S43 – 8 S43 – 0 S43 – 14
not shown here. S44 – 6 S44 – 1 S44 – 12
Step3. Calculate the fuzzy transitive closure t(R) of the 5 S7 - 23 S71 – 15 S7 - 8 S71 – 5 S7 - 47 S71 – 31
fuzzy similarity matrix R with the square method [9]. If the S72 – 16 S72 – 8 S72 – 30
S73 – 21 S73 – 4 S73 – 18
fuzzy similarity matrix can be expressed as R = (rij)nxn, then S74 – 19 S74 – 3 S74 – 42
R o R = (tij)nxn max
min , (2)
weight of the attribute values:
δ −δ
e j i
If o = − δi ), (3)
−1
, then the fuzzy transitive closure a ij = δ −δ
= log it (δ j
1 + e j i
[t(R)] = .
where δk is the scale location of object k and logit-1 is the
Use the cluster method to analyze t(R) with intercept λ and
inverse logit function.
determine the significant attributes set.
Here the calculations for the group “Teachers” are shown:
So the fuzzy set A is obtained:
III. DATA ANALYSIS 1 0.56218 0.57444 0.54157 0.37754
0.43782 1 0.51250 0.47918 0.32082)
(
A = 0.42556 0.48750 1 0.46672 0.31003( (4)
The investigation gave 300 questionnaires out to the 0.45843 0.52082 0.53328 1 0.33924(
individual mobile customers. The questionnaire enumerates 0.62246 0.67918 0.68997 0.66076 1 '
the quality parameters of the attribute layer corresponding to a
given service of the objective layer. For each service on of the Then, on Step 2, the fuzzy similarity matrix R is calculated:
1 0.95463 0.94595 0.95094 0.92991
objective layer the number of the customers that use the 0.95463 1 0.98009 0.96527 0.92442)
service is given and on the attribute layer - the number of (
users that have evaluate the corresponding attribute. The R = 0.94595 0.98009 1 0.95725 0.90856( (5)
results obtained by the investigation of all three groups are 0.95094 0.96527 0.95725 1 0.92817(
0.92991 0.92442 0.90856 0.92817 1 '
shown in the following Table III. The number of answers for
each attribute gives the relative importance of the After that the transitive closure [t(R)] for the set of
corresponding attribute in the group. This relative importance parameters is calculated according equation (2). In all cases,
is used as a weight of the attribute for the calculation of the being studied, the intercept λ is chosen from the values
fuzzy set values. obtained for [t(R)].
The calculation procedure is as follows: 1 0.95463 0.95463 0.95463 0.92991
)
0.95463 1 0.98009 0.96527 0.92991
Step 1. For each one group, after partitioning A into C and (
D the membership degree of each one attribute is calculated. [t(R)] = 0.95463 0.98009 1 0.96527 0.92991( (6)
For example: For the service 1 (S1) in group “Teachers” and 0.95463 0.96527 0.96527 1 0.92991(
the corresponding service attributes the following set A is 0.92991 0.92991 0.92991 0.92991 1 '
obtained: There are 57 (N = 57) positive answers on the above Here we can have the following values for λ. For each λ we
question 1. This is equal to 0,19 (K = N/Nall) of all can define the corresponding clusters of parameters:
participants in this study. Then the number of the positive λ=1 {S11},{S12},{S13},{S14},{S15}
answers on question 3, related to K is calculated. So the λ=0.98009 {S12, S13},{S11},{S14},{S15}
weight of each one attribute value is defined. λ=0.96527 {S12, S13, S14},{S11},{S15}
The elements in set A are calculated according the pair- λ=0.95463 {S11, S12, S13, S14},{S15}
wise[10] comparison of the attribute value with respect to the λ=0.92991 {S11, S12, S13, S14, S15}
69
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
Then we build the dynamic cluster diagram, from which the the most significant parameters for all groups and services
most significant parameters can be obtained. As shown on the will be shown (Table IV).
figure below, for the group “Teachers”, the most significant
parameters of the service S1 – Voice mail box are the
parameters coded as S12 and S13. All others parameters are
IV. CONCLUSION
concatenated one after another to the base cluster, built from
these two parameters. In this paper a fuzzy evaluation approach is introduced,
This dynamic cluster diagram can be implemented later as a used for definition of significant service parameters, that
model of deductive database for easier search of significant defines the customer satisfaction with the mobile services.
attributes also in cases of greater amount of parameters or in The study has to be continued in order to evaluate the already
case of deeper investigation of the significant service defined significant attributes from the mobile operator point
parameters. An appropriate method for cost effective search in of view.
such database structures is the 2P-Method introduced in [11]. The correspondence of the evaluation results will be a good
starting point for development of appropriate approaches,
methods and tools for improving the grade and the
effectiveness of the Customer Relationship Management and
the Customer Experience Management.
REFERENCES
Fig. 1. Dynamic cluster diagram [1] Al. Tsenov, “Customer Experience Hierarchy Model”,
Proceedings of the XLV-th International Scientific Conference
Following the same steps the following calculation and ICEST 2010, Ohrid, Macedonia, June 24 – 26, vol.1, pp. 77-80,
results are achieved for all other services in correspondence to 2010.
the services being studied. [2] Al. Tsenov, G. Yoncheva, E. Stoyanova and Al. Pavlov, “Fuzzy
Evaluation of Service Level Management Metrics”, XLVI-th
TABLE IV International Scientific Conference ICEST 2011, Nish, Serbia,
SIGNIFICANT PARAMETERS June 29 – July 01, presented paper, 2011
Servi Group λ Parameter clusters Significant [3] W. Lin, C. Lo, K. Chao, and N. Godwin, “Fuzzy Similarity
ce Parameters Clustering for Consumer-Centric QoS-aware Selection of Web
{S11},{S12,S13}, S12, S13 Services”, in Proc. CISIS 2009, pp. 904-909, 2009
S1 Teachers
0.91577 {S14},{S15} [4] S. Yajing et al., “Customer Value Hierarchy Based Customer
Administra {S11},{S12,S14}, S12, S14 Demand Analysis In Personalized Service Recommender
tion 0.96807 {S13},{S15} System”, International Journal of Simulation, Vol. 7 No 7, ISSN
Students {S11},{S12,S14}, S12, S14 1473-0831 print, pp. 77-84, 2007
0.95929 {S13},{S15} [5] Y. Danfeng, Y. Fangchun, “Fuzzy evaluation of SLA-oriented
Final S12, S14 QoSM (The Quality of Service Management) in NGN”,
S2 Teachers {S21},{S22,S24}, S22, S24 Proceedings of IC-BNMT, ISBN 978-1-4244-4591-2, pp. 301-
0.96113 {S23},{S25} 305, IEEE, 2009
Administra {S21,S24},{S22}, S21, S24 [6] Tsenov Al., I. Ivanov, T. Poparova, S. Neykov, L. Ivanova, M.
tion 0.96956 {S23},{S25} Gadjeva, “Fuzzy evaluation of customer satisfaction with
Students {S21},{S22},{S23,S24}, S23, S24 mobile services”, 10th International Conference TELSIKS
0.95954 {S25} 2011, vol. 2, pp. 665 – 668, October 5-8, Nish, Serbia,
Final S24 [7] H. Jiang, “Fuzzy Evaluation on ERP System Implementing Risk
S3 Teachers 0.93725 {S31, S33},{S32} S31, S33 Based on Membership Degree Transformation New Algorithm”,
Administra {S31}, {S32, S33} S32, S33 Second International Symposium on Electronic Commerce and
tion 0.85246 Security, Nanchang, China, May 22-May 24, pp 409-416, 2009
Students 0.86190 {S31, S33}, {S32} S31, S33 [8] Jordanova and V. Mladenov, “Fuzzy sets and computational
Final S31, S33 intelligence”, Lecture notes, Sofia University, 2005
S4 Teachers 0.95469 {S41, S44}, {S42}, {S43} S41, S44 [9] Sun Peide, “ Novel Fuzzy Clustering Algorithm to Predict Gas
Administra {S41, S43, S44}, {S42} S41, S43, Outburst Zone”. Proceedings of the 2006 International
tion 0.98709 S44 Symposium on Safety Science and Technology, October 24-27,
Students 0.94694 {S42, S44}, {S41}, {S43} S42, S44 2006 Changsha, Hu’nan, China
Final S41, S44 [10] David, H.A. (1988). The Method of Paired Comparisons. New
S7 Teachers 0.95217 {S71, S72},{S73},{S74} S71, S72 York: Oxford University Press.B. Milovanovic, Z. Stankovic, S.
Administra {S71},{S72},{ S73, S74} S73, S74 Ivkovic and V. Stankovic, "Loaded Cylindrical Metallic
tion Cavities Modeling using Neural Networks", TELSIKS'99,
0.95968
Conference Proceedings, pp.214-217, Nis, Yugoslavia, 1999.
Students 0.86853 {S72},{S71, S73},{ S74} S71, S73
[11] Iltchev V., Cost Evaluation of Methods for Query Processing in
Final S71, S73
Deductive Database Systems, Information Technologies and
Here, from all other calculations, only the highest grade of Control, Vol. 5, No 1, 2007, pp. 10-20, ISSN:1312-2622,
λ, the corresponding parameter clustering and the final result– Bulgarian Union of Automation and Informatics, Sofia,
Bulgaria,
70
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
Abstract - This paper discusses the common work of In practice, only 10% of servers capacity in a continuous
Linux - based IP phone systems Trixbox and Elastix, build mode is used. A large data center could save electricity
in virtual environments. Their interconnection with real equivalent to the consumption of 200,000 households under
switching systems is applied. Advantages of using loading up to 50% of its capacity. A serious problem for the
virtualization software in communications are shown using ecological balance is large carbon dioxide emissions.
VoIP software analyzators. Experiments are made, According to calculations, covering 50.000 data centers,
revealing the advantages of using VoIP telephony and emissions will exceed 10 million tons by 2013. These figures
virtualization, leading to much easier maintenance and leave no doubt that information technology bear their share of
more flexible services. responsibility for environmental protection [4].
Optimized use and better distribution of work is achieved By
Keywords – Voice-over-IP, Virtualization, Phone systems application virtualization, which in turn leads to fewer servers
and to shorten the prolonged periods in which they operate
without load. Integrated approach in the management of
I. INTRODUCTION information technology is beneficial not only for climate but
also for budget of the companies. It enables them to reduce
Transmission of data and voice via VoIP is extremely hardware investments and make large cost savings for
attractive to business users, service operators and for home electricity [5].
users because it allows Internet and data networks, already
established in offices[1], enterprises and administrative areas, Two experiments are made to examine the virtualization.
to transmit voice calls, video conferences to support and other Telephone software systems Trixbox and Elastix are used as
real-time applications. well as softphones and VoIP analizators.
VoIP telephone applications such as Asterisk-based
Trixbox can be uploaded to a virtual environment, which II. EXPERIMENTAL RESULTS
means reducing the number of physical machines and leads to
less power consumption, simplifying IT infrastructure, a much Virtual TRIXBOX and ELASTIX are loaded in the virtual
easier maintenance and much greater service flexibility [2]. machine.
Installation of multiple virtual environments (operating
systems and applications) in one physical server
(homogeneous hardware) is more economically reasonable Different software phone systems TRIXBOX and
than provision and maintenance of each physical server for ELASTIX are used when conducting the experiments. Some
each application [3]. of them are in virtual environment, while the rest are real
Figure 1.1. shows the qualitative leap made in the period 2007 working (not in virtual environment). For the purposes of the
to 2009, when the total number of installed physical servers study some other phone systems can be used such as 3CX and
stops to increase and even decreases at the expense of the different hardware switching systems. Test computers have
rapid growth of virtual machines. In the U.S. over the next 2-3 1GB RAM operating memory and processor Intel Pentium 4.
years the number of installed physical servers will be reduced Emulating virtual programs can be VMWare products
by 20%. (Workstation, VMWare Player), Microsoft products, Oracle
(Virtual Box) etc.
71
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
Fig.2.2. Distribution of RTP packets per unit time - IO Graphs Fig.2.5. Distribution of RTP packets per unit time
In fig. 2.3. with black the values of jitter are shown, the The values of jitter (black) and the delay between packets (in
average is about 3ms. In red delays between packets are red) have improved by about 2ms (Fig. 2.6) compared to the
marked. first investigation.
Fig.2.3. Jitter and delay of packets in graphical form Fig.2.6. Jitter and delay of packets in graphical form
Fig. 2.4 shows service quality of the audio signal (Audio Below is shown the total activity of the network - network
QoS). Reports for 30 seconds back have been noted. R factor activity, VoIP activity, conducted conversations, provided
(R Factor) is within the allowable (ranging from 0 to 120). packet activity, protocol activity. Everything is within normal
Packet loss in unusual circumstances (Burst Packet Loss limits.
Rate%) is 0.102% at source and destination at 0.055%.
Rejected packs (Discarded Packets) are respectively 2.105 and
26.
72
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
III. CONCLUSION
Contacts:
2
Krasen Zhivkov Bankov, student in . KТТ in FE of TU-Varna
„ Studentska” № 1 str, e-mail: banki4@abv.bg
1
Borislav Rozenov Necov, student in . KТТ in FE of TU-Varna,
„ Studentska” № 1 str, e-mail: sharkiller@mail.bg
3
Mario Petrov Georgiev, student in . KТТ in FE of TU-Varna,
„ Studentska” № 1 str, e-mail: markata88@gmail.com
73
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
I. INTRODUCTION
A new method of delivering and viewing television
channels over IP network and high speed broadband access
technology is called IPTV, short for internet protocol
television and also known as broadband TV. It is not only a
distribution method, but also bring new interactive features
and changes the way we watch TV. Ability to pause, resume
and fast forward TV shows gives freedom to every user to
make individual custom program schedule is only a small part
of innovations presented by interactive television. Internet
protocol television differs from Internet television as Internet Fig.1. IPTV architecture
TV is streaming video content over public Internet while Some of the most popular video compression standards are
IPTV is streaming dedicated video content via private shown in Table I below:
managed network with quality of service (QoS). If service
provider is delivering three services: Broadband internet, TABLE I
voice over IP (VoIP) and IPTV the technology is called Triple VIDEO COMPRESSION STANDARDS
play and if wireless mobility is added then it becomes Quad
play. World largest IT companies like Microsoft, Cisco and Published Standard Organization
Google are involved in developing end-to-end IPTV solutions: 1993 H.261/MPEG-1 ISO, IEC
Microsoft TV, Google TV and Cisco Content Delivery 1995 H.262/MPEG-2 ISO, IEC, ITU-T
System. 1999 MPEG-4 ISO, IEC
2003 H.264/MPEG-4 AVC ISO, IEC, ITU-T
II. IPTV ARCHITECTURE 2006 VC-1/WM9V ISO, Microsoft
2008 VC-2 Dirac ISO, BBC
End-to-end IPTV infrastructure consist of three major
components: originate (head-end), distribute (delivery Originally MPEG-1 is used for Video-CD (VCD) 120 mm
network) and consumption (user-end). An overview of typical optical disc and became the first format for distributing films.
IPTV architecture is presented on fig.1 MPEG-2 is internationally accepted standard for digital
television and is widely used for digital video broadcast
As IPTV is transmitted over IP it needs proper compression (DVB) systems.
techniques to compress the video prior to its transmission MPEG-4 is used for Internet and mobile video, standard-
depending on the available bandwidth. Researchers from ITU- definition (SDTV) and high-definition television (HDTV).
T have found MPEG compression the best possible solution MPEG-4 uses up to 50 % less bandwidth than MPEG-2 with
for this challenge. ITU-T has standardized H.264 and that is bit rates from 5 Kbit/s to 10 Mbit/s depending on quality and
equivalent to MPEG-4 (part 10) standardized by Moving video screen resolution.
To deliver video content over IP network IPTV system
1
Jordan Kanev is with the Faculty of Electrical Engineering and needs interactive services. IPTV services can be divided in
Electronics, Technical University of Gabrovo, 4 H. Dimitar St., 5300 three main groups: streaming TV, video on demand (VOD)
Gabrovo, Bulgaria, E-mail: danchokanev@gmail.com. and time-shifted TV. According to ETSI specification [6]
2
Stanimir Sadinov is with the Faculty of Electrical Engineering NGN integrated IPTV include following IPTV services:
and Electronics, Technical University of Gabrovo, 4 H. Dimitar St., Broadcast TV; Content on Demand (nCoD, pCoD); Personal
5300 Gabrovo, Bulgaria, E-mail: murry@tugab.bg.
74
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
Video Recording (cPVR, nPVR); Pay Per View (PPV); VoD content can be encrypted, scrambled and embedded
Interactive TV (iTV); User Generated Content (UGC); with a tag to avoid content piracy enforcing Digital rights
Profiling and personalization; Content Recommendations management (DRM).
(CR); Advertising (Ad) and Targeted Advertising (TAI); Then encoded video content is sent in an MPEG transport
Messaging services; Notification services; Personalized stream and depending on service it can be forwarded to
channel; Bookmarks or Content Marking (CM). service provider delivery network in case of live TV or stored
IPTV services provide users with more control over viewed on VoD server in case of video on demand service.
TV channels and give them ability to make decision what TV
content to choose and when to watch it. User can watch IPTV
with a number of network-addressable devices like laptop,
IV. DISTRIBUTION VIA IP NETWORKS
personal computer, set-top box and TV, smartphone, tablet,
gaming consoles, etc. Video originated at Head-end must be preserved and
transported across IP network to reach end users. Broadband
networks used for Internet (data) and voice services are ideal
III. OBTAINING VIDEO AT HEAD-END for adoption of IPTV. Physical layer (Layer 1) can be copper,
fiber optic, combination of both types and even broadband
Service providers need to acquire and encode video content. wireless (IEEE 802.11n). Technologies used for data link
They can use several different video sources and analog, layer (Layer2) are MetroEthernet, xDSL, FTTx, ATM,
digital and IP technologies to do that. Streaming video can be WiMAX, LTE, DVB-H, etc. Depending on cable types and
obtained from following sources: physical topology IP networks include intermediate devices
• Satellite - DVB-S (SDTV) / DVB-S2 (HDTV) like routers and switches to forward user data across the
network. Additional mechanisms and protocols are used to
• Cable – DVB-C / DVB-C2 ensure reliable delivery of IPTV traffic. IPTV traffic is
• Terrestrial – DVB-T / DVB-T2 sensitive to losses and delay. Quality of Service (QoS) is
• Analog TV - obsolete responsible for prioritizing video over other traffic on the
network. QoS Standards include IEEE 802.1p QoS, IEEE
TV signal acquisition needs different equipment like 802.1q VLAN, CEA2007 VLAN Mapping.
satellite dishes, TV antennas, cables modems, DVB receivers, Additional control software (or middleware) is required to:
Set-top boxes (STB) depending on source type and gain user access privileges, manage video content, to protect
technologies of distribution systems. There are also a variety intellectual property via Digital Rights Management (DRM),
of modulation methods and schemes, some of them are shown billing software and offer services like electronic
in Table II. programming guide (EGP), VoD catalog, web services,
TABLE II mobile applications, domain name system (DNS), Network
MODULATION SCHEMES Time Protocol (NTP), Dynamic Host Configuration Protocol
(DHCP), nCoD, nPVR, advertising, etc.
IPTV is delivered via IP multicast in case of streaming TV
Standard Modulation schemes or via IP unicast in case of video on demand. More complex
DVB-S QPSK,8PSK,16-QAM distribution method is available with combination of both
DVB-S2 QPSK,8PSK,16APSK,32APSK unicast and multicast delivery mode depending on underlying
DVB-C QAM : 16- to 256- QAM IP network topology of service provider delivery network.
DVB-C2 COFDM: 16- to 4096-QAM Internet Group Management Protocol (IGMP) is used to join
DVB-T COFDM(OFDM) : QPSK, 16QAM, 64QAM and leave multicast streams. IP Multicast Standards include
DVB-T2 OFDM: QPSK, 16QAM, 64QAM, 256QAM IGMPv1, IGMPv2 and IGMP Snooping.
Analog AM(VSB),FM,QAM According to ETSI specification [7] the transport streams
should be encapsulated with Real-Time Transport Protocol
Video on demand can be recorded live video stream for (RTP). Real Time Streaming Protocol (RTSP) is responsible
later review or uploaded video content from various sources to for control over delivery of video content. Real-Time
a dedicated VoD server or media library. Sources can be live Transport Control Protocol (RTCP) is used to send statistics
TV, Video CDs, DVDs, Blu-ray discs, cameras and various and control information for QoS.
multimedia devices.
After video acquisition it must be processed by video V. USER-END
encoder device. Typically live video content is compressed
using H.264/MPEG-4 AVC codec. Other codecs can also be User devices for IPTV reception include: traditional set-top
used instead. The most common codecs used for VoD are box (STB), IP STB, PC, smartphone, tablet and any internet
MPEG-2, MPEG-4 and VC-1. In case video is acquired browsing device able to play video content.
directly in older MPEG-2 or other video format transcoder
device can be used to convert data into desired video codec.
VI. CONCLUSION
75
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
ACKNOWLEDGEMENT
This paper is supported by Experimental Research Unit
(UTzNIT) at the Technical University of Gabrovo.
REFERENCES
[1] O’Driscoll, G., “Next Generation IPTV Services and
Technologies”, John Wiley & Sons, Inc, 2008.
[2] Cooper, W., Lovelace, G., “IPTV.Guide”, informitv, 2006.
[3] Microsoft, “Microsoft TV IPTV Edition”, available online at
http://www.microsoft.com/TV.
[4] Cisco, “Cisco IPTV Solutions”, available online at
http://www.cisco.com/go/iptv.
[5] IEEE 802-2001: “IEEE Standards for local and metropolitan
area networks: overview and architecture”, 2002.
[6] ETSI TS 182 028: TISPAN NGN Release v.3.5.1: “NGN
integrated IPTV subsystem Architecture”, 2011.
[7] ETSI TS 102 034 v1.4.1 “Transport of MPEG-2 TS Based DVB
Services over IP Based Networks”, 2009
[8] Конов, К., “Цифрово радио и телевизионно разпръскване”,
Диос, 2011.
76
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
77
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
p n k !1 K 1 2 p k l 1 !
l 2l n
1 ra2
n l k 1 m
a2 n 2l 2 k 2 m
1 l p k l 2
S 1 K
2
n p k m 2
2 K 1
1 2 1
a2 1 ra2 1 r 2
F1 n l k m 2, n l k 1, n l k 2, 2
pnk p l k i 1!1 K i 2i
2
p k l i 2
n l k 1
i 0 iS 1 K 2
2
p k l i 1
i! 1
2
2 1 2
2 F1 n p k m 2, n p k 1, n p k 2, 2
(6)
n p k 1
p l k !1 K n 2n 1 l 2 p k n 1!
pk n2 1 r 2 n p k 1 m
a2 n 2 p 2 k 2 m
1 n ,
a
S
1 K 2 n l k m 2
2 K 1
1 2 2
1
a 1 ra 1 r
2 2
(4)
p l k p n k j 1!1 K j 2 j in (3). The parameters ra and r are branch correlation
. a2 1 ra2 K 1
pk n j 2 coefficients and
j 0 jS 1 K
2
1 r 2
.
2 p k l j 1 j ! 1 2
2 1 2
IV. NUMERICAL RESULTS
Substituting Eq. (4) into Eq. (3), the average output SIR Previous proposed mathematical analysis is complemented
envelope is obtained in the analytical form using [17, Eq. in this section through illustration of influence of system and
(3.194(3))] channel parameters on the average output SIR as important
system performance criterion.
Figure 1 shows normalized average SIR ( / S ) at the
output of dual SC system applying different decision
78
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
algorithms in function of Rice factor. The performance sums in (5) and (6) converge for any values of branch
curves are evaluated for different values of correlation correlation coefficient and Rice factor. As is shown in Table I,
coefficient in order to show influence of distance between the number of terms that need to be summed to achieve the
diversity branches on considered performance criterion. desired accuracy strongly depends on branch correlation.
Regardless of applied decision algorithm, diversity gain
decreases with increase of branch correlation coefficient. Also TABLE I
diversity gain is greater for environment with light fading than NUMBER OF TERMS SUMMED TO ACHIEVE THREE-SIGNIFICANT-
for environment with severe fading. Comparison of Fig.1 (a) FIGURE ACCURACY OF AVERAGE OUTPUT SIR (DESIRED SIGNAL/SIR
ALGORITHM)
and Fig. 1 (b) shows advantage of SIR signal power decision
algorithm because it provides better diversity gain. That = 0.1 10/11
advantage is more noticeable for greater values of Rice factor. = 0.2 9/13
In environment with severe fading it is better to use SC = 0.3 9/12
system with desired signal power algorithm because it = 0.4 10/9
requires less complicate receiver and gives almost the same = 0.5 11/16
diversity gain as SC system with SIR decision algorithm.
2.43
2.42 = 0.1
V. CONCLUSION
2.41 = 0.2
= 0.3 In this paper the performance of dual SC system operating
Normalized average output SIR
2.40
= 0.4 in interference-limited microcell environment has been
2.39
= 0.5
2.38
studied. Actually, average output SIR as important
2.37
performance criterion has been derived in infinite series form
2.36
for the case when SC system using desired signal power
2.35
decision algorithm. Presented numerical results have
2.34
described influence of fading severity and correlation
2.33
coefficient on considered performance criterion. Moreover,
2.32
evaluated results have been compared with results obtained
2.31
for SIR decision algorithm. The general conclusion of this
2.30
paper is that SC diversity system with SIR algorithm provides
0 1 2 3 4 5 6 better diversity gain regardless of working conditions.
K [dB]
ACKNOWLEDGEMENT
a)
This work has been funded by Serbian Ministry for
2.43
Education and Science under the projects TR-32052, III-
2.42
44006, TR-33035.
2.41
Normalized average output SIR
2.40
2.39 REFERENCES
2.38
2.37 [1] W. C. Jakes, Microwave Mobile Communications, New York,
2.36
Wiley, 1974.
[2] M. K. Simon, M. –S. Alouini, Digital Communications over
2.35
r = ra = 0.1 Fading Channels, 2nd ed., New York, Wiley, 2005.
2.34
r = ra = 0.2 [3] L. Yang, M. –S. Alouini, “Average Outage Duration of Wireless
2.33 Communications Systems”, ch. 8, Wireless Communications
r = ra = 0.3
2.32 r = ra = 0.4 Systems and Networks, Springer, 2004.
2.31 r = ra = 0.5 [4] K. A. Stewart, G. P. Labedz, and K. Sohrabi, “Wideband
2.30 channel measurements at 900 MHz”, VTC’95, Conference
0 1 2 3 4 5 6 Proceedings, pp. 236-240, Chicago, USA, 1995.
K [dB] [5] Y. –D. Yao, A. U. H. Sheikh, “Investigations into cochannel
interference in microcellular mobile radio systems”, IEEE
b) Trans. Veh. Technol., vol. 41, no. 2, pp. 114-123, 1992.
[6] Y. –D. Yao, A. U. H. Sheikh, “Outage probability analysis for
Fig.1. Average output SIR versus Rice factor for several values of microcell mobile radio system with cochannel interferers in
correlation coefficient: Rician/Rayleigh fading environment”, Electron. Lett., vol. 26,
a) desired signal power algorithm; b) SIR power algorithm no. 13, pp. 864-866, 1990.
[7] I. Petrović, M. Stefanović, P. Spalević, S. Panić, and D.
The main problem in the infinite series expression of the Stefanović, “Outage Analysis of Selection Diversity over
average output SIR is its convergence. The nested infinite Rayleigh Fading Channels with Multiple Co-Channel
79
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
Interferers”, Telecomm. Sys., accepted for publication, DOI: Rician Fading Channels in the Presence of Cochannel
10.1007/s11235-011-9438z. Interference”, AEÜ, pp. 1061-1066, vol. 63, no. 12, 2009.
[8] I. Petrović, Z. Nikolić, M. Stefanović, S. Panić, P. Spalević, and [13] M. K. Simon, Probability Distributions Involving Gaussian
Dj. Bandjur, “Multiple Co-Channel Interferers Influence on Random Variables – a Handbook for Engineers, Scientists and
Selection Combining over Correlated Weibull Fading Mathematicians, New York, Springer, 2002.
Channels”, Frequenz, accepted for publication. [14] H. Yang, M. –S. Alouini, “Outage Probability of Dual-Branch
[9] Dj. Bandjur, M. Stefanović, and M. Bandjur, “Performance Diversity Systems in the Presence of Co-Channel Interference”,
Analysis of SSC Diversity Receiver over Correlated Ricean IEEE Trans. Wireless Commun., vol. 2, no. 2, pp. 310-319,
Fading Channels in the Presence of Co-Channel Interference”, 2003.
Electron. Lett., vol. 44, no. 9, pp. 587-588, 2008. [15] G. K. Karagiannidis, “Performance Analysis of SIR-based dual
[10] Z. Popović, S. Panić, J. Anastasov, P. Spalević, and M. Selection Diversity over Correlated Nakagami-m Fading
Stefanović, “Performance Analysis of Selection Diversity over Channels”, IEEE Trans. Veh. Technol., vol. 52, no. 2, pp. 1207-
Exponentially Correlated -µ Fading Environment”, Intern. J. 1216, 2003.
Commun. Syst., vol. 24, no. 7, pp. 925-937, 2011. [16] A. Panajotović, N. Sekulović, M. Stefanović, and D. Drača,,
[11] S. Jovković, S. Panić, M. Stefanović, P. Spalević, and D. Krstić, “BEP Comparison for Dual SC Systems Using Different
“Performance Analysis of SSC Diversity Receiver over Decision Algorithms in the Presence of Interference”,
Correlated Ricean Fading Channels in the Presence of Co- TELSIKS’11, Conference Proceedings, vol. 2, pp. 467-470, Niš,
Channel Interference”, EURASIP J. Wireless Commun. Net., Serbia, 2011.
vol. 2010, DOI: 10.1155/2010/583093. [17] I. S. Gradshteyn, I. M. Ryzhik, Table of Integrals, Series, and
[12] A. Panajotović, M. Stefanović, and D. Drača, “Performance Products, CD version 1.0, Academic Press, 1996.
Analysis of System with Selection Combining over Correlated
80
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
81
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
82
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
60
routes. In this network 18 from 42 traffic demands have 50
40
multiple shortest path. For each of them two equal cost routes 30
are chosen and traffic is balanced between them. This 20
10
algorithm is denoted as ECMP2 - Equal Cost Multi Path with 0
two routes. 0 0.02 0.04 0.06 0.08
The second algorithm for backup routes calculation is L max [ paths / Mbit/s ]
denoted as NOPHY and it is described in [9], [10]. The key Equal Opt-Lmax Opt-Lave
idea of this algorithm is traffic protection in case of link
outage, so the backup route is chosen as a shortest path route Fig. 2. Lmax in case ECMP2 two links have ten fold capacity reduction
that has no common links with primary route. Example of
NOPHY backup route choice for one traffic demand is shown 100
90
in Fig. 1. Where multiple shortest path route exists, the one of 80
them is chosen to be primary route, and according to it 70
CDF[%]
83
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
algorithms have considerably better results than equal traffic calculation of traffic distribution coefficients could be
distribution. Similarly, according to Lave criterion Opt-Lave has performed in each router. The straightforward implementation
the best results (Fig 3.). Note that differences between CDF of optimization algorithm, especially for Opt-Lmax which is
curves for Opt-Lmax and Opt-Lave algorithms are much higher nonlinear, could be difficult and time consuming, and
for Lmax criterion than for the Lave criterion. therefore it could be subject for future work.
For NOPHY backup route choice algorithm, compared to
ECMP2, the difference between Opt-Lmax and Opt-Lave CDF VII. CONCLUSION
curves is greater according to Lmax criterion (Fig.4.).
According to this criterion Opt-Lmax has from 25% to 40% Usage of unequal traffic balancing coefficients between
better performance according to Lmax criterion in 75% of main and backup route in IP radio-relay network with path
cases, while in 25% of cases the performance is the same. On diversity can serve both as traffic protection and load
the other hand, difference between Opt-Lmax and Opt-Lave balancing method. Simulation on test network confirmed that
CDF curves according to Lave criterion is only about 10% but unequal traffic distribution gives up to three times better
in all cases (Fig.5). For NOPHY algorithm both optimization results for link loads than equal traffic distribution. It is also
algorithms have about three times better results than equal showed that optimizing the maximum of link load, besides
traffic distribution (Fig.4., Fig.5.). from giving the best values of the maximum link load, also
100 gives good performance according average link load criterion.
90 The main drawback of minimizing maximal link load in
80
70 optimization process is its nonlinear character, which requires
CDF[%]
60
50
much more processing time for its calculation than
40 minimizing average link load.
30
20
10
ACKNOWLEDGEMENT
0
0 0.02 0.04 0.06 0.08 This work was partially supported by the Ministry of
L max [ paths / Mbit/s]
Education and Science of the Republic of Serbia under Grant
TR-32024.
Equal Opt-Lmax Opt-Lave
Fig. 4. Lmax in case NO PHY two links have ten fold capacity reduction REFERENCES
100
90 [1] Wells J., “Multigigabit Wireless Technology at 70 GHz, 80 GHz and 90
80 GHz”, RF Design, pp.50-58, May 2006.
70
[2] Sklar B. Digital Communications: Fundamentals and Applications,
CDF[%]
60
50 Prentice Hall, 2001.
40
[3] Xiong F. Digital Modulation Techniques, Artech House, 2000.
30
20 [4] ITU-R Rec. P.530-13, "Propagation Data and Prediction Methods
10 Required for Design of Terrestrial Line of Sight Systems", 2009.
0
[5] ITU-R F.1703, "Availability objectives for real digital fixed wireless
0 0.005 0.01 0.015 0.02
links used in 27 500 km hypothetical reference paths and connections",
L ave [ paths / Mbit/s] 2005.
Equal Opt-Lmax Opt-Lave [6] ITU R F.1668, "Error performance objectives for real digital fixed
wireless links used in 27 500 km hypothetical reference paths and
Fig. 5. Lave in case NO PHY two links have ten fold capacity reduction
connections", 2004.
[7] Perić D., Perić M., Petrović G., "Redundant Topology in Computer
VI. REMARKS FOR PRACTICAL IMPLEMENTATION Network Realized with Millimeter Wave Radio Links", 14th IST Mobile
and Wireless Summit, Dresden, June 2005.
[8] Srivastava V, Motani M., "Cross-Layer Design:A Survey and the Road
For practical implementation of traffic distribution Ahead", IEEE Communications Magazine, Vol.43, pp.113-119,
coefficient optimization, it is important to have information December 2005.
about current link capacity, which is adjusted to actual fading [9] Perić D., Perić M., Todorović B., "Traffic Protection Method in IP
condition. Typical multipath fading event, known also as fast Radio Networks above 70 GHz", IEEE Communications Letters, Vol.
fading has noticeable signal level changes at about 10ms, 14, Nо. 10, pp. 981-983, October 2010.
while reaction time of adaptive modulation techniques is [10] Perić D., Traffic Protection Method in IP Radio Network above 70 GHz,
PhD Thesis, Faculty of Techical Sceiences, University of Novi Sad,
about 40ms [1][3][4]. For rain attenuation fading [4] signal June 2011.
level changes are much slower about 10s. According to this, [11] Pioro M., Medhi D., Routing, Flow, Capacity Design in Communication
for frequency bands above about 18GHz, where rain and Computer Networks, Morgan Kaufmann, 2004.
attenuation is predominant effect, information about link [12] Retana A., Slice D., White R., Advanced IP network design (CCIE)
capacities, could be obtained from the link hardware by traffic professional development, CISCO Press, 1999.
monitoring protocol such as SNMP [15]. For lower frequency [13] Wolfram S., The Mathematica Book, 5th ed., Wolfram Media, 2003.
bands more agile technology should be used. [14] Dijkstra, E.W. "A Note on Two Problems in Connection with Graphs",
Numerische Mathematik 1, 269–271., 1959.
When information about link capacities are obtainable in
[15] RFC 1157, "Simple Network Management Protocol (SNMP)", IETF,
entire network, since routing tables are known to all routers, May 1990.
84
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
85
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
in SNR
OMAmin = . (4)
ρ
In communication systems noise can be viewed as an
impairment resulting in the degradation of the information
contained in the signal [7]. The optical receiver adds two
types of noise namely thermal noise and shot noise. Since
optical amplifiers are based on the principle of stimulated
emission, its main contribution to noise is ASE noise.
A. Thermal noise
Fig. 2. An example of an eye-diagram and its interpretation The thermal noise of a receiver arises from the fact that
electrons in a receiver circuit have some probability of
a lower BER. Eq. (2) gives the Q-factor of an optical signal generating a current even in the absence of an optical signal.
[4,6]: This noise (referred to as Johnson noise), can be represented
by the variance of thermal current per unit frequency [5]:
V1 − V0
Q= , (2)
σ1 +σ 0 σ th2 = 4kT / R , (5)
where V1 is the value of the binary 1, V0 is the value of the where T is the absolute temperature, k is Boltzmann's
binary 0, σ1 is the standard deviation of the binary 1 and σ0 is constant and R is the detector load resistance.
the standard deviation of the binary 0.
B. Shot noise
III. OPTICAL RECEIVER SENSITIVITY EVALUATION
The shot noise arises from the Poisson distribution of the
In optical communication systems, sensitivity is a measure electron-hole generation by the photon stream. The latter is a
of how weak an input signal can get before the bit-error ratio stochastic process having random arrival times. On average,
(BER) exceeds some specified number. the number of electron-hole pairs created will be proportional
Sensitivity can be expressed as average power (PAVG) in to the number of photons, with a given constant of
dBm or as optical modulation amplitude (OMA) in WP-P (peek- proportionality.
to-peek). Each gives a figure of merit for the receiver [3,4,6]. During a given time interval, with a certain number of
To achieve the best optical sensitivity, it is important to photons incident upon the detector, the number of electron–
maximize the signal Q-factor before data decision. The hole pairs generated will have fluctuations as determined by
equation for calculating sensitivity is as follows [4,6]: Poisson statistics [5]. A dc photocurrent of Ipd will generate a
shot noise power density of:
i SNR (re + 1)
PAVG = 10 log n 1000 , dBm , (3) σ sh2 = 2eI pd . (6)
2 ρ (re
− 1)
D. ASE Noise
where in is the noise of TIA; ρ – responsivity flux
(conversion efficiency) of the photodetector, in A/W; re – the
ASE is produced by spontaneous emission that has been
ratio of a logic-one power level (P1) relative to a logic-zero
optically amplified by the process of stimulated emission in
power level (P0) [4,7].
gain medium. Noise associated with ASE is the limiting factor
The process in estimating the minimum peak-to-peak swing
in determining the ultimate signal-to-noise ratio in any system
of the optical signal begins with the choice of the maximum
using optical amplifiers [3,4,5]. The output ASE power can be
BER. This determines the signal-to-noise ratio (SNR). Next,
calculated using classical derivation in:
the RMS input referred noise (in) of the TIA and the
responsivity (ρ) of the photodetector must be found from the PASE = nsp (G − 1)hvBo , (7)
vendor’s data sheets. These are related by:
86
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
87
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
The CDR jitter-tolerance penalty on optical sensitivity can From Figs.3 and 4 it is evident that for OSNR lower than
be estimated by combining Eqs. 17 and 18, then solving for IP- 12,75dB a dominant factor is the amplifier noise when
P as: determining the optical receiver sensitivity. For higher OSNR
dominant is the jitter-tolerance penalty. In general, to achieve
2QBER .t r .N TOTAL a specified BER, the minimum TIA input current should
I P−P = . (20)
(JTP−P
− DJ P − P ).0,6 satisfy the QBER in both amplitude and timing.
-16
REFERENCES
-18
88
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
89
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
Pi =
i 1+ β A (7)
Let us consider a multi servers loss system Polya/D/∞∞ with k
n
1 / β + k − 1 β A
a Polya input stream with arrival rate λ, constant service time
∑
k =0
k
1+ β A
τ and infinite number of servers. This queueing system is a
non-Markovian model or renewal process (Fig. 1).
The name truncated is due to the fact that the solution may
be interpreted as a conditional Polya distribution Pi(| i≤n). The
Sources Servers Ao fact that we are allowed to truncate the Polya distribution
1
1 means that the relative ratios between the state probabilities
are unchanged. We prove this fact by simulation.
2
A=λτ 2 IV. TRAFFIC CHARACTERISTICS OF
M, V POLYA/D/N/0 SYSTEM
90
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
91
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
VII. CONCLUSION [9] Korn G. and T. Korn. “Mathematical Handbook for Scientists
and Engineering”, McGraw Hill, 1968, pp. 575.
In this paper the Polya distribution is used to describe the
peaked arrival processes in telecommunication networks. A 1E+00
basic generalised multiple loss teletraffic model Polya/G/n/0 A = 15 erl
1E-01
with peaked input flow, generalise service time and full n = 50
accessibility is investigated. All performance measures of 1E-02
interest are estimated. The idea is based on the Polya
State probabilities, Pi
distribution as an analytical continuation of the Poisson 1E-03
distribution and the classical M/G/n/0 system. M/G/n/0
1E-04 z = 1.02
The proposed approach provides a unified framework to
z = 1.5
model peaked teletraffic in real telecommunication systems. z = 2.0
1E-05
Numerical results and subsequent experience have shown that z = 3.0
this approach is accurate and useful in analyses of traffic 1E-06 z = 4.0
systems and especially in Quality of Service and performance z = 5.0
parameters estimation. 1E-07
The importance of this multiple loss teletraffic system with 0 5 10 15 20 25 30 35 40 45 50
peaked input stream comes from its ability to describe Number of the calls in the system
1E+00
ACKNOWLEDGEMENTS
Polya/G/n/0
1E-01
n = 30
Traffic congestion probabilities, Ba
0.6
China, Vol. 6a, 2005, pp. 1335-1344.
M/G/n/0
[5] Iversen, V. B. “Teletraffic Engineering Handbook”, ITU-D &
z = 1.02
ITC. 312 pp. Edition spring 2004, 0.4
http://www.com.dtu.dk/education/34340/. z = 1.5
92
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
93
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
94
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
TABLE I
802.21 PRIMITIVES IMPLEMENTED IN EXATA
95
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
REFERENCES
[1] IEEE 802.21-2008, Standard for Local and Metropolitan Area
Networks - Part 21: Media Independent Handover Services,
IEEE Std., Jan. 2009.
[2] R. Ferrus, O. Sallent, and R. Agusti, “Interworking in
Fig. 3. UMTS to WLAN handover delay heterogeneous wireless networks: comprehensive framework
and future trends,” Wireless Communications, IEEE, vol. 17, no.
interface, requesting it to disconnect from the network. In this 2, pp. 22–31, 2010. [Online]. Available:
way, a make-before-break handover takes place. http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber =5450657
Fig. 3 shows the handover delay measured for 30 [3] D.-H. Kim, J.-Y. Gwak, W.-T. Kim, S.-J. Kim, and C.-H. Lee,
simulations, done with different seed values. We can conclude “Design and Implementation of WLAN/HSDPA Interworking
Architecture,” 2008 Third International Conference on
that the handover delay from UMTS to WLAN varies around
Convergence and Hybrid Information Technology, no. Cm, pp.
a mean value of 313 ms, with the lowest value reaching about 741–744, Nov. 2008. [Online].
27 ms, and the highest value situated at 667 ms. Available:http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?
arnumber =4682116
[4] W. Lim, D. Kim, and Y. Suh, “Efficient WLAN Discovery
Schemes Based on IEEE 802.21 MIH Services in
VI. CONCLUSION AND FURTHER WORK Heterogeneous Wireless Networks,” Conference, 2008. IEEE,
2008. [Online]. Available:
This paper proposed an interworking architecture for http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4698822
mobility between heterogeneous networks based on the IEEE [5] K. Peppas, F. Lazarakis, A. Alexandridis, K. Dangakis, and D.
802.21 (MIH) standard and applied to handover from UMTS Axiotis, “NGL03-4: An Interoperability Mechanism for
to WLAN networks. It defines a framework for providing Seamless Interworking between WLAN and UMTS-HSDPA
handover-related information flows to a Resource Manager in Networks,” in Global Telecommunications Conference, 2006.
GLOBECOM’06. IEEE, 2006, pp. 1–5. [Online]. Available:
charge of taking the handover decision.
http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4150888
Results have shown that the handover delay has relatively [6] W. Song, W. Zhuang, and Y. Cheng, “Load Balancing for
small but different values as they depend also on network Cellular/WLAN Integrated Networks,” IEEE Network, no.
conditions. Further studies have to be carried out. In February, pp. 27–33, 2007
particular, the handover delay between WLAN and UMTS [7] EXata 2.0.1 Programmer’s Guide, Scalable Network
networks needs to be measured and evaluated in different Technologies, Inc., Jun. 2009
network conditions (also the corresponding scenarios [8] A. Vulpe, S. Obreja, O.-E. Barbu, C.-D. Penciu, M. Buga, and
implementation in EXata can be improved) in order to B. Ciobotaru, Qualnet implementation for mobility management
evaluate it in a general manner. Also, different handover in a MIH enabled system,” in 8th International Conference on
Communications (COMM) 2010, Jun. 2010, pp. 523–526.
metrics can be introduced. The framework also needs to be
[9] A. Vulpe, S. Obreja, and O. Fratu, “A study of mobility
enhanced to support more technologies, especially LTE, as it management using IEEE 802.21,” in 9th International
is the leading emerging cellular technology. Symposium on Electronics and Telecommunications (ISETC)
2010, Nov. 2010, pp. 205–208.
[10] ——, “Interoperability procedures between access technologies
ACKNOWLEDGEMENT using IEEE 802.21,” in 2nd International Conference on
Wireless Communication, Vehicular Technology, Information
This research activity was supported by the Ministry of Theory and Aerospace Electronic Systems Technology
Communications and Information Society of Romania under (Wireless VITAE) 2011, Feb./Mar. 2011, pp. 1–5.
96
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
97
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
is Erlang distributed. The new client arrives in the left side of running Windows. All this is made possible with the .NET
the system, then he is serviced in k-stages with k, the Framework.
function of the arrival rate is defined with (1).
f ( x) e x x 0 (1)
The service rate is (2).
k (kx) k 1 e rx
F ( x) x0
(r 1)!
(2)
We consider the Erlang distribution like a part of
Geometrical distribution.
C. [X]/[X]/1/N
0 1 2 k
(b)
Fig.3 Program realization: simulation of rare events in
Fig. 2 Queuing system Еrl/D/1/k teletraffic systems
98
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
99
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
in the range of 5% and 10%. The number of simulation splitting, IEEE Transactions on Automatic Control AC-43
samples is n=100 000. (12),1998, p.1666-1679.
The same simulation is made for Geo/Geo/1/N queuing [12] Görg , C. Schreiber, F, The RESTART/LRE method for rare
systems with geometric characteristics of arrival rate and event simulation, Proceedings of the 28th conference on Winter
simulation, p.390-397, December 08-11, 1996, Coronado,
geometric service rate, the received results for buffer size 20, California, United States.
30 and 40, are presented on Table IV. The prescribed error is [13] Görg, C. Schreiber, F. The RESTART/LRE method for rare
in the range of 5% and 10%. The number of simulation event simulation. Winter Simulation Conference, California,
samples is n=100 000. The main difference here is the absence USA, 1999, pp. 390-397.
of rare events for 100 000 trials, for some of the chosen
parameters.
REFERENCES
[1] Awan I.U., D.D.Kouvatsos, Arbitrary queueing network models
with service priorities and blocking, Proc. Of 12th UK
Workshop of Perf. Eng. Of Computer and Telecommunication
Systems, ed. D.D. Kouvatsos, ilkley, UK, 1997.
[2] Boer. P. Analysis and Efficient Simulation of Queuing models
of Telecommunication Systems. PhD thesis, Univ. of Twente,
2000.
[3] Bucklew, J. An Introduction to Rare Event Simulation. Springer
Series in Statistics, XI. Springer-Verlag, Berlin, 2004.
[4] Cerou, F., Guyader, A. Adaptive multilevel splitting for rare
event analysis. Rapport de Recherché 5710, INRIA, October
2005, pp.32-40.
[5] L’Ecuyer P., Demers V., Tuffin B., Splitting for rare-event
simulation, Proceedings of the 37th conerence on Winter
simulation, Monterey, California, 2006.
[6] L’Ecuyer P., Demers V., Tuffin B., Rare events, splitting, and
quasi-Monte Carlo, ACM Transactions on Modeling and
Computer Simulation (TOMACS), v.17 n.2, p.9-es, 2007.
[7] Garvels M., D.P. Kroese. A comparison of RESTART
implementations. In Proceedings of the 1998 Winter Simulation
Conference, Washington, DC, 1998 p. 601–609.
[8] Garvels M. The splitting method in rare event simulation. PhD
thesis, University of Twente, The Netherlands, 2000.
[9] Garvels, M., D. Kroese, A Comparison of RESTART
Implementations, University of Twente, Centre for Telematics
and Information Technology, 2005.
[10] Glasserman P., Heidelberger P., Shahabuddin P., Zajic T.,
Splitting for rare event simulation: analysis of simple cases,
Proceedings of the 28th conference on Winter simulation,
Coronado, California, United States,1996, p.302-308.
[11] Glasserman P., Heidelberger P., Shahabuddin P., Zajic T., A
large deviations perspective on the efficiency of multilevel
100
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
1
Yakim Mihov is with the Faculty of Telecommun. at TU-Sofia, 8
Kl. Ohridski Blvd, Sofia 1000, Bulgaria, yakim_mihov@abv.bg.
2
Boris Tsankov is with the Faculty of Telecommun. at TU-Sofia, 8
Kl. Ohridski Blvd, Sofia 1000, Bulgaria. bpt@tu-sofia. bg
Fig. 1. Illustration of the teletraffic serving system.
This research was partly supported by the Bulgarian Ministry of
Education and Science under Grants DVU02/135/2008 and
DDVU02/13/17.12.2010.
101
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
In this section, the performance of the secondary CR Fig. 3. Cognitive traffic capacity versus the number of channels
network with limited channel availability is analyzed by available to the secondary CR network.
102
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
Bs <=1.5%; Bd <=0.1%; N =35; Nc =20; (Bp <=6.8593e-004) errors is considerably reduced, since some channels of the
14 primary network are never occupied by SU calls.
The suggested modification of the investigated serving
12 system with limited availability leads to considerable
performance enhancement of the secondary CR network in
Allowable SU traffic - A s, Erl
4
The serving system with limited availability (Fig. 1)
The modified serving system with limited availability (Fig. 2)
2 REFERENCES
5 10 15 20
Offered PU traffic - Ap , Erl
[1] J. Mitola III and G. Q. Maguire, “Cognitive Radio: Making
Software Radios More Personal”, IEEE Personal
Fig. 4. Cognitive traffic capacity versus the offered PU traffic. Communications, vol. 6, no. 4, pp. 13-18, August 1999.
[2] I. F. Akyildiz, W.-Y. Lee, M. C. Vuran, and S. Mohanty, “A
Survey on Spectrum Management in Cognitive Radio
SU call blocking probability Bs and SU call dropping Networks”, IEEE Communications Magazine, vol. 46, no. 4, pp.
40-48, April 2008.
probability Bd have to be maintained. As Ap increases, the
[3] W.-Y. Lee and I. F. Akyildiz, “Optimal Spectrum Sensing
maximum allowable offered SU traffic As decreases (see
Framework for Cognitive Radio Networks”, IEEE Transactions
Fig. 4). Consequently, the traffic capacity of the CR network on Wireless Communications, vol. 7, no.10, pp. 3845-3857,
depends on the PU traffic load and the use of CR for DSA is 28 October 2008.
rational in primary networks with sufficiently underutilized [4] A. A. El-Saleh, M. Ismail and M. A. M. Ali, “Optimizing
transmission resources. Spectrum Sensing Parameters for Local and Cooperative
Finally, we analyze the effect of applying the proposed Cognitive Radios”, 11th International Conference on Advanced
modification of the serving system (see Fig. 2) on the Communication Technology (ICACT), pp. 1810-1815,
Gangwon-Do, South Korea, 15-18 Feb. 2009.
performance of the secondary CR network. Figs. 3 and 4 show
[5] A. Ghasemi and E. S. Sousa, “Collaborative Spectrum Sensing
that the modified serving system provides greater cognitive for Opportunistic Access in Fading Environments”, 1st IEEE
traffic capacity. Because of the suggested modification of the International Symposium on New Frontiers in Dynamic
serving system, the channels (that are not used Spectrum Access Networks (DySPAN), pp. 131-136,
for DSA) are more likely to be occupied by PU calls than the Baltimore, MD, USA, 8-11 Nov. 2005.
Nc cognitive channels, which leads to a reduction in the SU call [6] C.-W. Wang, L.-C. Wang and F. Adachi, “Modeling and
dropping probability Bd. Similarly, the probability for spectrum Analysis of Multi-User Spectrum Selection Schemes in
handover of ongoing SU calls decreases as well, which Cognitive Radio Networks”, The 20th IEEE International
facilitates the QoS provisioning in the CR network, since under Symposium on Personal, Indoor and Mobile Radio
certain circumstances spectrum handover could cause Communications (PIMRC), pp. 828-832, Tokyo, Japan,
intolerable transmission delay. Therefore, the application of the September 2009.
proposed slight modification to the serving system considered [7] L.-C. Wang and C. Anderson, “On the Performance of
herein improves considerably the performance of the Spectrum Handoff for Link Maintenance in Cognitive Radio”,
secondary CR network. The 3rd International Symposium on Wireless Pervasive
Computing (ISWPC), pp. 670-674, Santorini, Greece, May
2008.
[8] O. Jo, H. H. Choi and D.-H. Cho, “Seamless Spectrum
V. CONCLUSION AND FUTURE WORK Handover Improving Cell Outage in Cognitive Radio Systems”,
4th International Conference on Cognitive Radio Oriented
Wireless Networks and Communications (CROWNCOM),
In this paper, the call-level performance of a VoIP pp. 1-6, Hannover, Germany, June 2009.
secondary CR network operating over a VoIP primary network [9] L. Giupponi and A. I. Perez-Neira, “Fuzzy-based Spectrum
in accordance with the hierarchical spectrum overlay approach Handoff in Cognitive Radio Networks”, The 3rd International
for DSA is investigated in the specific case when DSA is Conference on Cognitive Radio Oriented Wireless Networks
performed only on a predefined subset of primary channels. and Communications (CROWNCOM), pp.1-6, Singapore, May
The simulation results presented in this paper prove the 2008.
feasibility of the proposed new paradigm for DSA with limited [10] L.-C. Wang and C.-W. Wang, “Spectrum Management
availability. The main advantage of DSA with limited Techniques with QoS Provisioning in Cognitive Radio
availability is that the cognitive processing load can be Networks”, The 5th IEEE International Symposium on Wireless
significantly reduced. Moreover, the risk of causing intolerable Pervasive Computing (ISWPC), pp. 116-121, Modena, Italy,
interference to the primary network due to spectrum sensing May 2010.
103
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
104
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
105
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
−
ms
Ω synchronization, in the channel under the influence of fading
ms ms Ω ms −1e Ωs is (similarly as in [9]):
pΩ (Ω) = , Ω>0, (2)
Γ ( m s ) Ω s ms
1 ρ
Pb (φc ; ρ ) | DE − QPSK = erfc (cos φc − sin φc )
where Ωs = E[ x ] is the gamma shadow area mean power. The 2 2
parameter ms refers to the shadowing severity. With lower
values of ms, the shadowing influence is stronger. In the case 1 ρ
ms=∞, shadowing is not exist. × 1 − erfc (cos φc − sin φc )
2 2
The composite envelope r of the gamma-shadowed
Nakagami-m faded signal is:
1 ρ
∞ + erfc (cos φc + sin φc )
2
p(r ) = ∫p
0
r / Ω (r / Ω) pΩ (Ω)dΩ . (3) 2
1 ρ
Substituting (1) and (2) in (3), we have: × 1 − erfc (cos φ c + sin φc ) (7)
2 2
m + ms
4 mms 2
p(r ) = where ρ represents SNR per symbol.
Γ(m)Γ(ms ) Ω s In order to evaluate the average BEP for DE-QPSK, the
PDF of phase error should be known. The conditional BEP
mms must be averaged over that PDF.
× r m + ms −1 K ms − m 2r (4) The appropriate PDF of loop’s phase error in the form of
Ω s
the Tikhonov distribution for DE-QPSK is given by [9]:
where Kν(.) is the modified Bessel function of the second kind 4 exp( ρ eq ( ρ ) cos 4φc )
pφ c (φc ; ρ ) QPSK = ,
and order ν and Ω s = E[r 2 ] = r2
is the average power. 2πI 0 ( ρ eq ( ρ ))
The instantaneous SNR per symbol, ρ, and the average
SNR per symbol, ρ0, are related by: ρ PLL ( ρ ) S L (ρ )
QPSK π π
ρ eq ( ρ ) = , - ≤ φc ≤ , (8)
µ2 ρ 16 4 4
= , µ > 0, ρ > 0 . (5)
µ 2 ρ 0 where ρ eq represents an equivalent loop’s SNR, ρ PLL is
The distribution of the SNR in gamma-shadowed Nakagami- loop’s SNR that can be expressed as
m fading channel can be obtained using (4) and (5) by ρPLL(ρ) = P / N0 BL = (Eb / N0 ) /(BLTb ) = (ρ / 2) /(BLTb ) (BL denotes
applying standard technique of transforming random the one-sided loop bandwidth). Degradation term referred to
variables: as “squaring loss”, SL is given by [9]:
m + ms
2 mms 2 S L |QPSK ( ρ ) =
p( ρ ) =
Γ(m)Γ(ms ) ρ 0 2
ρ
erf − 2 ρ exp − ρ
m + ms − 2 mms 2 2π 2 . (9)
×ρ 2 K
ms − m 2 ρ. (6) =
ρ ρ 1
2
ρ
ρ0
1 + ρ − 2 erf + exp −
2
Remark that ρ is the instantaneous SNR per symbol, and ρ0 2 2 π
is the average SNR per symbol. The average SNR per bit is
ρ 0b = ρ 0 / log 2 M = ρ 0 / 2 in the case of quadrature To obtain average BEP, it is necessary to average
conditional BEP (7) over PDF of phase error (8). Under the
modulation formats. influence of fading, the instantaneous SNR is random
variable. It is also required to do averaging of (7) over PDF of
III. AVERAGE BEP PERFORMANCE IN THE PRESENCE OF instantaneous SNR per symbol (6). The BEP of DE-QPSK is:
CARRIER PHASE ERROR OVER THE GAMMA-SHADOWED
∞ π /4
NAKAGAMI FADING CHANNEL
Pb | DE − QPSK = ∫ ∫ P (φ ; ρ ) b
ρ = 0 φ c = −π / 4
c DE − QPSK
A. DE-QPSK
For DE-QPSK, the expression for conditional BEP in the × pφ c (φc ; ρ ) QPSK p ( ρ )dφc dρ . (10)
presence of a phase error φ c , due to imperfect carrier
106
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
B. DE-OQPSK ∞ π /2
1 ρ
× 1 − erfc cos φc
4 2 10
-1
ρ
-2
10
1
− erfc (cos φc − sin φc )
Pb
8 2
-3 m=1, ms=3, BLTb=0.1
10
m=1, ms=3, BLTb=0.05
2 exp( ρ eq ( ρ ) cos 2φc ) Fig. 1. DE-QPSK BEP dependence on SNR per bit for different
pφ c (φc ; ρ ) |OQPSK = , values of BLTb
2πI 0 ( ρ eq ( ρ ))
The same BEP dependence for DE-OQPSK is shown in
ρ PLL ( ρ ) S L OQPSK (ρ ) π π Fig.2. The conclusion is the same: System has better
ρ eq ( ρ ) = , - ≤ φc ≤ . (12) performance for lower value of BLTb.
4 2 2
m=1, m s=3, B LT b=0.1
“Squaring loss”, SL, for DE-OQPSK is given by [9]: 10
0
= 2
10
-2
ρ ρ ρ 1 ρ
1+ − erf + exp −
2 2 2 π 2 -3
10
to do averaging of (11) over PDF of instantaneous SNR per Fig. 2. DE-OQPSK BEP dependence on SNR per bit for different
symbol (6). The BEP of DE-QPSK is: values of BLTb
107
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
0
10 value of fading parameter m, we have severe fading.
The DE-QPSK and DE-OQPSK BEP dependences on SNR
per bit are shown in Fig.5. We have greater difference
10
-1
between DE-QPSK and DE-OQPSK when the parameters are
higher, i.e. when the impacts of fading and shadowing are
ms=0.5
lower. When the impact of fading and shadowing (m=3 and
ms=1
ms=5) is lower, the DE-QPSK and DE-OQPSK BEPs have
Pb
-2
10
ms=2
same value when SNR per bit is 4.5dB. For lower values of
ms=3
ms=4
SNR, system has better performance for DE-QPSK. When the
10
-3
m=1
SNR per bit is higher than 4.5dB, the system has better
BLTb=0.05 performance for DE-OQPSK.
DE-QPSK
10
-4 V. CONCLUSION
0 5 10 15 20 25 30
ρ0b (dB) In this paper, we have derived the expressions for BEP of
DE-QPSK and DE-OQPSK when the phase error introduced
Fig. 3. DE-QPSK BEP dependence on SNR per bit for different by loop’s finite SNR is taken into account and the signal is
values of ms
transmitted over the gamma-shadowed Nakagami-m fading
values of the parameter ms is lower, the influence of channel. The effects of the parameter BLTb and the fading and
shadowing is bigger and we have worse system performance. shadowing parameters on the BEP have been noted.
Fig.4. shows DE-OQPSK BEP dependence on SNR per bit,
for different values of the parameter m. The performance of ACKNOWLEDGEMENT
the system is the worst when the m=0.5. With decreasing
0
This paper was supported in part by the Ministry of Science
10
of Republic of Serbia under grant TR-32028 and in part by the
Norwegian Ministry of Foreign Affairs within the project
Norwegian, Bosnian and Serbian cooperation platform for
-1
10 ministry and industry in ICT R&D.
m=0.5 REFERENCES
Pb
-2
10 m=1
m=2 [1] I. M. Kostic, “Analytical approach to performance analysis for
m=3
m=4
channel subject to shadowing and fading”, IEE Proceedings
10
-3
ms=3 Communications, vol. 152, no. 6, pp. 821-827, December 2005.
BLTb=0.05 [2] P. S. Bithas, N. C. Sagias, P. T. Mathiopoulos, G. K.
DE-OQPSK
Karagiannidis, A. A. Rontogiannis, “On the performance
-4
analysis of digital communications over generalized-K fading
10
0 5 10 15 20 25 30
channels”, IEEE Communications Letters, vol. 10, no. 5, pp.
353–355, May 2006
ρ0b (dB)
[3] P. M. Shankar, “Error Rates in Generalized Shadowed Fading
Fig. 4. DE-OQPSK BEP dependence on SNR per bit for different Channels”, Wireless Personal Communications, vol. 28, no.3,
values of m pp. 233-238, February 2004.
10
0 [4] V. Milenkovic, N. Sekulovic, M. Stefanovic, M. Petrovic,
“Effect of microdiversity and macrodiversity on average bit
error probability in gamma shadowed Rician fading channels”,
10
-1
ETRI Journal, vol. 32, no. 3, pp. 464-467, Jun. 2010.
[5] N. Sekulovic, M. Stefanovic, “Performance analysis of system
with micro- and macrodiversity reception in correlated gamma
-2
10 shadowed Rician fading channels”, Wireless Personal
Communications, accepted for publication (published online
Pb
-3
12. Feb. 2011.), DOI: 10.1007/s11277-011-0232-8.
10
m=1, m s=1 DE-QPSK [6] A. Goldsmith, Wireless Communications, New York,
m=1, m s=1 DE-OQPSK Cambridge University Press, 2005.
-4 m=3, m s=5 DE-QPSK [7] M. K. Simon, M. S. Alouini, Digital Communication over
10
m=3, m s=5 DE-OQPSK Fading Channels: A Unified Approach to Performance
B lT B=0.1 Analysis, New York, John Wiley & Sons, Inc., 2000.
10
-5 [8] J. G. Proakis, Digital Communications, 4th ed., New York:
0 5 10 15 20 25 30 McGraw-Hill, Inc., 2001.
ρ0 b (dB) [9] M. K. Simon, “On the Bit-Error Probability of Differentially
Encoded QPSK and Offset QPSK in the Presence of Carrier
Fig. 5. DE-OQPSK and DE-OQPSK BEP dependence on SNR per Synchronization”, IEEE Transaction on Communications, vol.
bit 54, no. 5, May 2006.
108
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
A. What is QoS?
109
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
"aggressive" because they are bursty or consume a lot of Layer 4 parameters— L4 protocol (TCP/UDP), source/
bandwidth. If the application is bursty, determine if there is a destination ports
constant burst or a small burst. Is the packet size of the Layer 7 parameters— application signatures via Network
application large or small? Is the application TCP or UDP Based Application Recognition (NBAR)
based [5]? NBAR is a Cisco proprietary technology that identifies
application layer protocols by matching them against a
TABLE I Protocol Description Language Module (PDLM), which is
APPLICATIONS THAT REQUIRED QOS essentially an application signature. The NBAR deep-packet
classification engine examines the data payload of stateless
Characteristic Guideline
protocols against PDLMs. There are over 98 PDLMs
Application that is Do not use weighted random embedded into Cisco IOS software 12.3 code.
delay− or early detection (WRED), traffic Additionally, Cisco IOS software 12.3(4)T introduces the
loss−sensitive. shaping, fragmentation (FRF−12 ability to define custom PDLMs which examine user-defined
(Voice and Real Time (describes the method of strings within packet payloads.
Video) fragmenting Frame Relay frames PDLMs can be added to the system without requiring an IOS
into smaller frames)), or upgrade because they are modular. NBAR is dependent on Cisco
policing. For this kind of traffic, Express Forwarding (CEF) and performs deep-packet
you should implement Low classification only on the first packet of a flow. The remainder of
Latency Queuing (LLQ) and use the packets belonging to the flow is then CEF-switched.
a priority queue for the Within an enterprise, marking is done at either Layer 2 or
delay−sensitive traffic. Layer 3, using the following fields:
Application that is Use WRED, policing, traffic
802.1Q/p Class of Service (CoS)—Ethernet frames can be
consistently bursty or shaping, or class−based weighted
marked at Layer 2 with their relative importance by setting the
is a bandwidth hog. fair queuing (CBWFQ) to
802.1p User Priority bits of the 802.1Q header. Only three bits
(FTP and HTTP) guarantee bandwidth.
are available for 802.1p marking. Therefore, only 8 classes of
Application that is Use WRED since lost packets service (0-7) can be marked on Layer 2 Ethernet frames.
TCP−based. cause TCP to back off and then
IP Type of Service (ToS) byte—Layer 2 media often
ramp up again using the
changes as packets traverse from source to destination, so a more
slow−start algorithm. If the
ubiquitous classification occurs at Layer 3. The second byte in an
traffic is UDP−based and does
IPv4 packet is the ToS byte. The first three bits of the ToS byte
not change its behaviour when
are the IPP bits. These first three bits combined with the next
packets are dropped, do not use
three bits are known collectively as the DSCP bits.
WRED. Use Policing if you need
DSCPs and Per-Hop Behaviors (PHBs)—DSCP values
to rate−limit the application;
can be expressed in numeric form or by special standards-
otherwise just let the packets
based names called Per-Hop Behaviors. There are four broad
tail−drop.
classes of DSCP PHB markings: Best Effort (BE or DSCP 0),
RFC 2474 Class Selectors (CS1–CS7, which are
III. CISCO QOS TOOLSET identical/backwards-compatible to IPP values 1–7), RFC 2597
Assured Forwarding PHBs (AFxy), and RFC 3268 Expedited
This section describes the main categories of the Cisco QoS Forwarding (EF).
toolset and includes the following topics (Figure 2): DSCP values can be expressed in decimal form or with their
Classification and Marking tools PHB keywords. For example, DSCP EF is synonymous with
Policing and Markdown tools DSCP 46, and DSCP AF31 is synonymous with DSCP 26.
Scheduling tools IP Explicit Congestion Notification (IP ECN)—IP ECN,
Link-specific tools as defined in RFC 3168, makes use of the last two bits of the
AutoQoS tools IP ToS byte, which are not used by the 6-bit DSCP markings,
as shown in Figure 3.
Call Admission Control tools
110
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
111
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
112
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
113
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
multi-peak and single-peak neurons [1,4]. Multi-peak neuron fundamental is 440 Hz, while the frequencies of harmonics
can be excited with multiple frequencies that are harmonically are: 880 Hz, 1320 Hz, 1760 Hz and 2200 Hz. The spectrum of
related. A frequency required to have minimum energy to such a complex sound is given in Fig. 1. The task of the
excite a multi-peak neuron is called the central frequency and subjects was to repeat the pitch of the reproduced sound by
it is equal to frequency of the first harmonic (fundamental). singing neutral syllable La.
The other frequencies are required to have more energy to
make the same excitation [1,4]. Single-peak neuron is excited 100
3k
are excluded from the analysis because they generate sounds
identical to those of instruments from other groups.
2k
Since pitch perception is a subjective attribute, it is
investigated here through the listening tests. They were
carried out in a typical listening situation (in a typical living 1k
room). In the listening tests, different complex sounds were
presented to the subjects over the headphones (Beyedynamic 0
2 3 4 1
DT-770 Pro), while the subjects’ response was recorded by Time (s)
the condenser microphone (AKG C444) and stored in the Fig. 2 Spectrogram of generated complex sound used in the listening
corresponding audio tracks using HP 110 Mini computer with test 3
Intel Atom N270 processor and integrated sound board. The
task of the subjects was to repeat pitch of the reproduced In the listening test 4, the complex sound of duration of 2
sound by singing neutral syllable La or to give the answers to seconds consisting of 5 harmonics with random distribution
particular questions. was presented to the subjects in the same manner as in other
Ten subjects participated in the listening tests of which 7 tests. The frequencies of harmonics are: 440 Hz, 475 Hz,
were male and 3 were female. The mean age of the subjects 483 Hz, 502 Hz, 543 Hz. The spectrum of this complex sound
was 26. Nine subjects have graduated from the Faculty of Arts is given in Fig. 3. The task of the subjects was the same as in
(Music Arts) and one subject is a student of the secondary the tests 1 and 2 - to repeat the pitch of the reproduced sound
music school. In that regard, they can be considered to be by singing the neutral syllable La.
expert listeners. Similarly as in the test 2, the first partial (with frequency of
The listening tests are divided in five groups – test 1 to test 440 Hz) of the signal from test 4 was removed, and such a
5. In the listening test 1, the complex sounds of duration of 2 complex signal was presented to the subjects in the listening
seconds consisting of fundamental and 4 harmonics were test 5. The task of the subjects was the same - to repeat the
presented to the subject by the headphones. The frequency of pitch of the reproduced sound on the neutral syllable La. The
114
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
purpose of this test is to compare the results with those from 100
100 50
Relative amplitude (dB)
50
0
100 1k 10k 20k
0 (a) Frequency (Hz)
100
IV. RESULTS
0
Performed spectral analysis shows that chordophones and 100 1k 10k 20k
(b) Frequency (Hz)
aerophones instruments have harmonically related partials,
while membranophones and ideophones instruments do not 100
115
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
2
0
100 1k 10k 20k Number of
(a) Frequency (Hz)
subjects
1
20k
Frequency (Hz)
0
139 Hz 150 Hz 204 Hz 226 Hz 236 Hz 247 Hz 495 Hz
15k
Fundamental frequency of subjects response
0 ACKNOWLEDGEMENT
1 1.5 0.5
2
(b) Time (s)
This research is partially supported by the Ministry of
Fig. 5. Representative response of a subject in the listening test 1:
Science and Technological Development of Serbia through
spectrum (a) and spectrogram (b) of the sang neutral syllable La
the project No. 44009.
100
Relative amplitude (dB)
REFERENCES
[1] Xiaoqin Wang, “The Harmonic Organization of Auditory
50 Cortex”, The Neurophysiological Bases of Auditory Perception,
pp. 211-222, 2010.
[2] William A. Sethares, “Tunnig, Timbre, Spectrum Scale”,
Second Edition, London, Springer-Verlag, 2005.
[3] Martin Russ, “Sound Synthesis and Sampling”, Third Edition,
0
100 1k 10k 20k Oxford, Focal Press, 2009.
(a) Frequency (Hz) [4] ”Jennifer K. Bizley, Kerry M. M. Walker, “Sensitivity and
Selectivity of Neurons in Auditory Cortex to the Pitch, Timbre,
20k and Location of Sounds”, The Neuroscientist, Vol. 16, No. 4,
pp.453-469, 2010.
Frequency (Hz)
116
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
I. INTRODUCTION
The task of filter synthesis is a mathematical problem of
approximating ideal functions with rectangular shape. The
transfer function of the filter results from the approximation.
The aim is to obtain a mathematical relationship which has the
lowest computational complexity and approximation error. In
approximations with polynomials, this indicator is the degree
of the polynomial. Fig. 1. Polynomial approximations of the Kronecker’s delta
This paper will show a method for digital filter design
based on a polynomial approximation with “compressed function using L2 norm, method of Parks-McClellan [2] with
cosines”. trigonometric polynomial using L∞ norm.
It is seen that a suitable trade-off between the flatness in the
II. BACKGROUND stopband and the bandwidth must be done. In all the criteria,
the functions have the oscillations in the stopband. These
In some practical cases the passband filter is required to oscillations are undesirable. The goal is to obtain a rectangular
have a very narrow bandwidth. The ideal characteristic of a shape of the ideal function, that has maximally flat pass band
supernarrowband filter is Kronecker’s delta function and stop band, and narrowest possible bandwidth. In L2 case
the oscillations increase near the main lobe. This is due to the
1, x = 0.5
δ ( x) = ; x ∈ [ 0,1] . (1) Gibbs’ phenomenon [3]. In the approximations using L∞
0, x ≠ 0.5 norm the oscillations are with equal amplitude. These
This is a transfer function of a filter that has a pass approximations are known as optimal and equiripple.
bandwidth equal to zero, stopband gain equal to zero and an The approximations with rational functions [4, 5], have
infinite steepness of its characteristic. It cannot be realized in better properties than the polynomials approximations. The
practice. Hence, Kronecker’s delta function needs to be most popular are Chebyshev, Butterworth and Cauer.
approximated by another one, which can be realized. The In [5, 6] a polynomial approximation method with
approximation is carried out with a preset accuracy ε > 0 . The compressed cosines is proposed. With this method a third
difference between the ideal function and the approximating degree polynomial with significantly better properties than the
polynomial defines the error function. The two most popular other polynomials approximations is derived. The
approximation accuracy is close to the approximations with
norms for the approximation are L2 - weighted integral least-
rational functions. The polynomial has the form
4
P3 = ∑ bk cos [( k − 1) ϕ ] , (2)
1
Peter Apostolov is with the Department of Wireless k =1
Communications and Broadcasting at the College of
Telecommunications and Posts, Sofia 1700, 1 Acad Stefan Mladenov with coefficients:
St, Bulgaria. E-mail: p_apostolov@abv.bg
117
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
0.6
a1=5.6075e14 a2=-3.348e14 a3=8.7823e13 a4=-1.3321e13
a5=1.2944e12 a6=8.4311e10 a7=3.7445e9 a8=-1.1304e8
0.4
a9=2.2671e6 a10=-2.8705e4 a11=1885.71
11
Q = f 0 n ∑ ak ∆f n
11− k
0.2 ; ∆f n ∈ [ 0.0127,1.272e − 3 ) ; (10)
ε k =1
ε
0
a1=1.2838e25 a2=-9.0581e23 a3=2.79655e22 a4=-4.9689e20
-ε -ε
a5=5.6239e18 a6=-4.2396e16 a7=2.1628e14 a8=-7.435e11
-0.2
0 0.25 f
s1
0.5 f
s2
0.75 1 a9=1.6817e9 a10=-2.3764e6 a11=206.1499
11
Fig. 2. Approximation of the Kronecker’s delta by a third-degree
Q = f 0 n ∑ ak ∆f n
11− k
optimal polynomial ; ∆f n ∈ [1.272e − 3, 3.14e − 4 ) ; (11)
k =1
frequency, f 0 is the middle frequency of the passband. a1=9.934e34 a2=-7.838e32 a3=2.7414e30 a4=-5.6059e27
Fig. 2 shows an optimal approximation of Kronecker’s delta a5=7.4403e24 a6=-6.7267e21 a7=4.2269e18 a8=-1.8471e15
function by an optimal 3rd degree polynomial . f s1 and f s 2 are a9=5,5072e11 a10=-1.0692e8 a11=1.2226e4
the two normed stopband frequencies. Their difference 11
Q = f 0 n ∑ ak ∆f n
11− k
defines the bandwidth ∆f stop . The passband is defined by ; ∆f n ∈ [ 3.14e − 4, 5.965e − 5 ) ; (12)
k =1
∆f pass - the bandwidth at level -3dB. The approximation error
a1=-1.6808e41 a2=2.5067e38 a3=-1.4578e35 a4=3.5739e31
ε determines the stopband attenuation DS, and the quality
a5=1.3647e27 a6=-3.3608e24 a7=1.016e21 a8=-1.6545e17
factor Q the bandwidth ∆f stop . The filter’s coefficients are a9=1.6554e13 a10=-1.0265e9 a11=36979.1
obtained by those of the polynomial:
11
Q = f 0 n ∑ ak ∆f n
11− k
hk = b4 2 , b3 2 , b2 2 , b1 , b2 2 , b3 2 , b4 2 . (5) ; ∆f n ∈ [ 5.965e − 5, 5.5e − 6 ) . (13)
k =1
The filter’s transfer function has the form a1=-4.7623e49 a2=1.2294e46 a3=-1.1141e42 a4=2.0403e37
a5=3.8601e33 a6=-3.5797e29 a7=1.5185e25 a8=-3.7635e20
H = −0.25 + ( 0.5 − ε ) exp ( − jϕ ) − 0.25 exp ( − j 2ϕ ) . (6)
a9=5.697e15 a10=-5.176e10 a11=263267.1
By substituting the defined in (7) ∆f n = 0.025 into (9),
III. DESIGN EXAMPLE Q = 5.0714 is obtained. This allows for defining the transfer
function of the allpass lattice filter. The coefficients of the
The realization will be demonstrated with an example of a
denominator of the transfer function are determined by those
bandpass digital IIR filter design with the following
of the denominator of the Butterworth bandpass filter of first
specification: middle frequency in the pass band f 0 = 800 Hz; order with bandwidth
∆f pass = 100 Hz; sampling rate f d = 8000 Hz; degree of the
∆f Butt = f 0 Q = 157.7469 Hz. (14)
polynomial m = 3 ; attenuation in the stopband DS ≥ 20 dB.
118
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
The coefficients in the numerator are the same as in the accordance with the commutative law. This allows the input
denominator, but in reverse order. signal to pass twice through one allpass lattice filter. The
bandpass filter is implemented with the scheme in Fig.4
−1 −2
c1 + c2 z + z Fig. 5 shows the magnitude response in dB (10 lg x ) . Fig.
H AP ( z ) = −1 −2
; z = exp ( − jω ) ;
1 + c2 z + c1 z 6 shows an output response of a computer simulation of the
filter with 5 multipliers. The filter input is fed with a
c1 = 0.8832 ; c2 = −1.5265 . (15) discretized at 8000Hz linear chirp signal with frequency
sweep from 1 to 4000Hz, amplitude of ± 0.25V and duration
Then of 10 seconds. It is seen that the filter’s output response
corresponds to the input specification.
−1 −2
0.8832 − 1.5265 z + z This implementation requires frame signal processing with
exp ( − jϕ ) = H AP ( z ) = −1 −2
. (16)
1 − 1.5265 z + 0.8832 z
In Fig.3, the diagram of the designed filter is shown. A
0
criterion for comparing the selectivity of the digital filters is
the number of multipliers with which they are realized.
-10
-15
1
Fig. 3. Functional diagram of the filter
0.8
one multiplier to reduce the power consumption. As it is
0.6
known, the allpass lattice filters are realized with 4
multipliers. Therefore, the total number of multipliers in the 0.4
0.2
multiplier as both allpass filters are the same and
0
h1 = h3 = −0.25 . If the filter’s coefficients are multiplied by 4,
-0.2
then h1 = h3 = −1 . Then the filter will be realized with 5 -0.4
-0.6
-0.8
-1
0 400 800 1200 1600 2000 2400 2800 3200 3600 4000
f(Hz)
119
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
the polynomial, as in other polynomial approximations, but to 2. Butterworth, Chebysev and Cauer filters of second order
use an allpass lattice filter with high Q-factor. The bandwidth are implemented by 7-9 multipliers. Fig.9 shows a similar
of the stopband ∆f stop is a result of the approximation. It can comparison. In this case the magnitude response of the filter
using compressed cosines with 5 multipliers has a lower
not be defined in the input specification. With a third-degree selectivity.
Magnitude Response
0
0 Compr.cos
Butterworth
-20
-10 Chebyshev
20lglAl
-40 Cauer
-60 -20
-80
0 500 1000 1500 2000 2500 3000 3500 4000
20lglHl
f(Hz) -30
Pass Band Ripple Stopband
0
0
-40
-1 -20
20lglAl
20lglAl
-40 -50
-2
-60
-3 -80 -60
799 799.5 800 800.5 801 760 780 800 820 840 0 500 1000 1500 2000 2500 3000 3500 4000
f(Hz) f(Hz) Frequency(Hz)
-30
Improved Selectivity, IEEE Transaction on Antennas and
propagation, Vol.59, Issue10, pp.3940-3943, Aug. 2011.
-40 [7] Apostolov, P. S. Methof for FIR filter design with compressed
cosine using Chebyshev’s norm. Signal Processing Elsevier,
Vol. 91, Issue 11, pp. 2589-2594, Nov.2011.
-50
-60
0 500 1000 1500 2000 2500 3000 3500 4000
Frequency(Hz)
120
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
I. INTRODUCTION
At work on the project about research of the valuable
Bulgarian bells the database was created, in which almost all
characteristics of the bells were included [1]. Database
includes acoustical records, obtained via unique measurement
set. The used measurement and processing methods can be
implemented to the other purposes.
The bell is a complicated sound source with a very wide
frequency range and an unique dynamic range of the
transmitted signal. Its spectrum contains infrasound, sound
and ultrasound partials. The dynamic range is very large too
and it cannot be detected entirely by human ear whose
dynamic range of perception is about 120dB. The best all over
the world measurement set with a corresponding measurement
Fig. 1 Localization characteristics of
microphone at this moment was used because of this [2]. For
example, this set is able to process the signal without interval in the time axis and interval , in frequency
distortions with dynamic range up to 160dB. which are including 90% of his energy, concentrated around
The most modern processing methods and integrated center of mass of functions and ². The
system of computer mathematics MatLab are used [3]. The modulation on this function is translation of the rectangle
features of the source and the raw records require this way of across axis ω, while the scaling of function (her contraction or
measurement [4].
In this paper we propose a new method of presentation of
some transformations (Fourier Transform and Wavelet
Transform for example). Wavelet Transform gives the
improvement for analysis and reception via conversion of 2D
signal into pseudo 3D signal. Conform transformation
improves these possibilities in addition. We introduce “sound
print” as analog of the “fingerprint”, used in the criminology
1
Tihomir Trifonov is with the Dep. of Algebra and Geometry at
Veliko Tarnovo University "St. St. Cyril and Methodius", 3 Arch.
Georgi Kozarov Str., V. Turnovo BG-5000, Bulgaria, e-mail:
tihomirtrifonov@ieee.org
2
Ivan Simeonov is with the Dep. of CIS at National Military
University Vasil Levski of Veliko Turnovo, 76 Bulgaria Blvd, V.
Turnovo BG-5006, Bulgaria, e-mail: ivanov_ivan@nvu.bg.
3
Rosen Dzhakov is with the Faculty of Artillery, Air-Defense and
CIS Faculty of NMU, 1 Karel Shkorpil Str., Shumen BG-9713
Shumen
Fig. 2. The disposition of unique bells, denoted as
Мelnik1 -1270AD and Melnik2-1220 AD, in the National
Historical Museum in Sofia.
121
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
stretching) changes the rectangle proportions. Theese objects denoted as Melnik2-1220 AD. and Мelnik1 -
In this case, the function (t) can be represented as
rectangle on the plane , as shown in fig. 1.
Unlike to Fourier transform - FT and Short time fourier
transform – STFT, wavelet transform will alters the rectangle
type for analysis according to the frequency, area of rectangle
will stay constant. An illustration of local properties of
wavelets in frequency area is shown on figure 3. This is a kind
of analyze where, the relation is constant or the
quality factor Q is equal. The time-frequency window area
stay for a different scales, where и are the
second central moments on the functions and .
More precisely, suppose that , or (a,b)
determine one point in right-half plane, then the continuous
wavelet transform (CWT) of a continuous, square-integrable Fig. 4. Data Acquisition Unit 3560В Brüel & Kjær
function is expressed by:
122
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
123
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
APPENDIX
III. ADDITIONAL REMARKS
Bell’s donation inscriptions XIII century:
The possibility for analyze and perception is improved by
transformation on two-dimensional acoustic signal image to Bell Melnik2, 1211-1216 year
pseudo three-dimensional (scalogram). Material: bronze, Place: Tower-belfry on the metropolitan
Additional improvement in perception is achieved by using church of St. Nicholas, Melnik.
a conformal mapping of the obtained scalogram, because there "† The bell /is/ forged out of copper, a gift from despot Alexii,
are well-known iris recognition techniques that can be † pious Slav to St. Nicholas, he who is from Mira.“
applied.
124
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
125
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
Out b
z -2
In c
Out
126
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
tions depending on their poles positions. Thus, in the second These additional deviations should be kept as lower as pos-
HT realization (denoted with "4 ST1-2") four ST1-2 sections sible mainly by reducing the influence of the parasitic effects
were used. In the third and fourth implementations, two MH1- (by minimizing the sensitivities to the variations of the multi-
2 and two ST1-2 sections have been selected. In the first case, plier coefficients values). It will appear from what follows,
we have a special section of each type in every branch of the that it might not be an easy straightforward procedure.
realization, while in the second case – two MH1-2 sections are The accuracies of the HT realizations (the phase difference
used in the upper branch (the real output) and two ST1-2 sec- between the two branches) in a limited word-length environ-
tions – for the imaginary output. The results for the overall ment are compared in Fig. 6. Based on the results shown in
sensitivity of the two branches are shown in Fig. 5. Fig. 5, it is natural to have a high sensitivity (to small changes
in the two branches) of the phase difference between the two
outputs in Fig. 2 for 4 MH1-2 HT realization, but the results
shown in Fig. 6a are quite surprising, compared to these in
Fig. 6b,c,d (with minimized sensitivity). We suppose that this
might be an effect due to some internal compensation between
the parasitic effects in the branches, explained with the
different signs of the sensitivities. The worst-case sensitivity
WS, used in our investigations, is not able to reveal these
mutual compensations, because it is eliminating the signs of
the individual sensitivities.
The highest accuracy, as it is shown in Fig. 6, is achieved
when we have two MH1-2 and two ST1-2 sections each in
every branch (I case) of the HT. In this case, the selection of
the sections and their placement in the branches are made
under the above mentioned observations.
(a)
(b)
Fig. 5. Worst-case phase-sensitivities of the HT (Fig. 2) realized
with different sets of allpass sections (for a 9-th order HT).
It appeared that the best configuration is with two MH1-2
and two ST1-2 sections, each in every branch (I case),
providing the lowest overall sensitivity in both paths.
127
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
REFERENCES
(d) using 2 MH1-2 and 2 ST1-2 sections - II case [1] C. S. Turner, “An efficient analytic signal generator”, Signal
Proc. Magazine, vol. 23, pp. 91-94, July 2009.
Fig. 6. Word-length dependence of the accuracy of the HT phase [2] C. B. Rorabaugh, “Notes on Digital signal processing: practical
difference for realizations with different allpass sections. recipes for design, analysis, and implementation”, Notes 58-66,
As it can be seen after quantization to 2 bit (in CSD code) Prentice Hall, 2011.
not only the fluctuations of the phase difference in Fig. 6a,b,d [3] P. A. Regalia, “Special Filter Designs”, Chapter 13 in the book
are growing very much above the ideal, but the range of Handbook for Digital Signal Processing (Editors S. K. Mitra
and J. F. Kaiser), John Wiley & Sons, NY, pp. 909-931, 1993.
frequencies over which this difference is approximately
[4] L. Milic, J. Certic, M. Lutovac, “A class of FRM-based allpass
constant, is sharply reduced, while in Fig. 6c these parameters
digital filters with applications in half-band filters and Hilbert
are practically unchanged. transformers”, Proc. Intern. Conf. on Green Circuits and Syst.
The main conclusion of these investigations is that besides (ICGCS)’2010, Shanghai, China, pp. 273-278, June 2010.
the sensitivity minimization, an additional step, consisting of a [5] S. Mitra, Digital signal processing: A computer based
study of all possible combinations of the selected allpass approach, McGraw-Hill, 2006.
sections within the branches, has to be introduced. A more [6] G. Stoyanov and H. Clausert, “A comparative study of first
general solution of this problem will be a derivation of a order digital all-pass structures”, Frequenz, vol. 48, No 9/10, pp.
formula about the sensitivity of the phase quadrature to the 221-226, Sept./Oct. 1994.
changes of the multipliers’ values, but it may appear to be a [7] H. Sugino and A. Nishihara, “Frequency-domain simulator of
very difficult task. digital networks from the structural description”, Trans. of the
IEICE of Japan, vol. E73, No.11, pp. 1804-1806, Nov. 1990.
[8] G. Stoyanov, Z. Nikolova, K. Ivanova, V. Anzova, “Design and
VII. LOW-SENSITIVITY DESIGN PROCEDURE realization of efficient IIR digital filter structures based on sen-
sitivity minimizations”, Proc. 8th IEEE Conf. TELSIKS'2007,
Taking into account all results so obtained, we propose the Nish, Serbia, vol. 1, pp. 299–308, Sept. 2007.
following design procedure: [9] G. Stoyanov, K. Nikolova, and M. Kawamata, "Low-sensitivity
design of allpass based fractional delay digital filters", Chapter
1. Obtain H HT (z ) Eq. (5) by applying the standard design
7 in the book Digital filters, F. P. Márquez (Ed.), Intech Publ.
procedure from Sect. 2. House, pp. 155–178, 2011.
128
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
2 2
c nz λ j , k
f = ⋅ + , Hz (3)
2 lz π ⋅ lr
φ
nZ , j , k = 0,1, 2,...
lZ (r , φ , z )
r The natural frequency of the cylindrical box, calculated in
accordance with mathematical dependence (3) is presented in
r Fig. 3 and Table I.
φ
2 ⋅ lr 1
1 0.6
Ekaterinoslav Sirakov is with the Department of Communication
Engineering and Technologies, Faculty of Electronics, Technical 0.4
University-Varna, Studentska Street 1, Varna 9010, Bulgaria, E-mail:
katiosirakov@abv.bg 0.2
2
Hristo Zhivomirov is a Ph.D. student with the Department of
Communication Engineering and Technologies, Faculty of 0
0 1 2 3 4 5 6
Electronics, Technical University-Varna, Studentska Street 1, Varna frequency, kHz
9010, Bulgaria, E-mail: hristo_car@abv.bg. Fig. 3. Plot of mode distribution
129
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
130
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
1
Since the dodecahedral loudspeaker array consists of twelve
Marko Jelenković is a student at the Faculty of Electronic loudspeakers, independent signals were fed via two audio
Engineering at University of Niš, Aleksandra Medvedeva 14, Niš interfaces to every of these twelve channels. Eight channels of
18000, Serbia, E-mail: virtus@elfak.rs.
2 M-Audio ProFire and four of M-Audio Fast Track Pro provide
Dejan Ćirić is with the Faculty of Electronic Engineering at
University of Niš, Aleksandra Medvedeva 14, Niš 18000, Serbia, E- the needed twelve channels, which could be controlled
mail: dejan.ciric@elfak.ni.ac,rs. independently. The diagram of the measurement system is
3
Jelena Zdravković is a student at the Faculty of Electronic shown in Fig. 2. Due to the different characteristics of the
Engineering at University of Niš, Aleksandra Medvedeva 14, Niš interfaces, setting up of the system was more complicated, and
18000, Serbia, E-mail: jelena.z@elfak.rs. a latency problem was inevitable. The problems were resolved
4
Stefan Tomić is a student at the Faculty of Electronic Engineering by applying special calibration method that includes
at University of Niš, Aleksandra Medvedeva 14, Niš 18000, Serbia, measuring of impulse responses for both sound cards
E-mail: stefan@elfak.rs. independently and determination of latency difference
131
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
between two impulse responses. Based on this information, clock applied for the test signal reproduction and recording of
silence of appropriate duration is automatically added before the response during the measurement is not required [12]. In
the measurement signal with smaller latency. In this way, the present research, an excitation swept sine signal of
signals from both sound cards have the same latency. duration of about 24 seconds with frequency range from 10
Hz to 22 kHz sampled at 44.1 kHz is used.
Three excitation combinations are utilized. For the first one,
six loudspeakers from one half of the sphere are fed with the
same sweep signal, and the other six with opposite phase of
the same signal. For the second and the third one, two
opposite loudspeakers on the sphere are fed with
corresponding signals. In one of the configurations,
loudspeakers are fed with the same signals in phase and in the
other one with same signals, but in opposite phases.
The radiation directivity is measured only in horizontal
plane with resolution of 10o, so there are 36 impulse responses
for each excitation combination. Measurements were
performed in a way that the microphone was fixed, and sound
source was rotated around its horizontal axis. Processing of
the extracted part of the impulse response (free of reflections)
is performed in the frequency domain, which is based on FFT
and determination of impulse response spectrum. After
determination of spectrum, next step is determination of
direction of maximal radiation (reference axis), which is used
for normalization and presentation of directivity patterns.
Using this kind of processing, radiation pattern can be
obtained for many different frequencies. Actually, the
maximum number of frequencies (the frequency resolution)
depends on the length of the extracted impulse response
containing only direct sound. Summary of impulse response
processing is given in Fig. 3.
132
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
-90o 90o
o o
-150 0 dB 150
(a) 180o -20
-120o -10
120o
0o0 dB 6166 Hz
-90o 90o
o o
-150 0 dB 150
(b) 180o -20
-120o -10
120o
Fig. 4. Radiation directivity of dodecahedral loudspeaker array with
six elements in phase and six elements in opposite phase at lower (a)
and higher (b) frequencies
-150o 0 dB 150o
(b) 180o
In the second configuration case, with two opposite
elements fed with the same signal in phase, the obtained
radiation characteristics are omni-directional at lower Fig. 5. Radiation directivity of dodecahedral loudspeaker array with
frequencies, while they get shape of narrowed figure-of-eight two opposite elements in phase at lower (a) and higher (b)
pattern at higher frequencies (Fig. 5.). For the last frequencies
133
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
ACKNOWLEDGEMENT
-90o 90o
-20
Presented results are obtained within the scope of the
project no. 36026 financed by Ministry of Science and
Technological Development of Republic of Serbia.
-120o -10
120o
REFERENCES
-150o 0 dB 150o
(a) 180o [1] J. H Rindel, F. Otondo, “The interaction between room and
musical instruments studied by multi-channel auralization,” in
Proc. of Forum Acusticum, Budapest, Hungary, 2005.
0o0 dB 6132 Hz
[2] K. Brian FG, D’A. Christophe, “Directivity measurements of
o o 8726 Hz
-30 30 singing voice,” in Proc. 19th International Congress on
14621 Hz
Acoustic, Madrid, Spain, 2007.
-10 [3] O. Warusfel and N. Misdariis, “Directivity synthesis with a 3D
-60o 60o array of loudspeakers application for stage performance,” in
Proc. Conf. Digital Audio Effects (DAFX-01), Limerick,
-20
Ireland, 2001.
[4] B. Stojić, D. Ćirić, M. Marković, “Radiation directivity of
dodecahedral sound source with independent elements”, (in
-90o 90o Serbian), in Proc. LIV ETRAN, paper AK3.5, Donji Milanovac,
Serbia, 2010.
-20 [5] D. Ćirić, “Control of radiation directivity of multi-loudspeaker
sound source”, (in Serbian), in Proc. LIII ETRAN, paper
-120o -10
120o AK3.3, Vrnjačka Banja, Serbia, 2009.
[6] B. Stojić, D. Ćirić, M. Marković, “Radiation directivity of
spherical sound source with independent element dodecahedral
-150o 0 dB 150o loudspeaker array”, in Proc. 1st EAA-EuroRegion, paper S20-
(b) o 11, Ljubljana, Slovenia, 2010.
180
[7] P. Kassakian, D. Wessel, “Caracterization of spherical
loudspeaker arrays,” presented at 11 th AES Convention, San
Fig. 6. Radiation directivity of dodecahedral loudspeaker array with Francisco, USA, 2004.
two opposite elements, one in phase and one in opposite phase on [8] N. Misdariis, O. Warusfel, R. Causse, “Radiation control on a
lower (a) and higher (b) frequencies multi-loudspeaker device,” in Proc. International Symposium on
Musical Acoustic 2001, Perugia, Italy, 2001.
[9] N. Misdariis, F. Nicolas, O. Warusfel, R. Causse, “Radiation
V. CONCLUSION control on multi-loudspeaker device: La Timée,” in Proc.
International Computer Music Conference, Havana, Cuba, 2001.
[10] A. Farina, “Simultaneous measurement of impulse response and
In this paper, radiation directivity of spherical sound source
distortion with a swept-sine technique,” presented at 108th
with independent elements in the form of dodecahedron is Convention Audio Eng. Soc., abstract in J. Audio Eng. Soc.,
analyzed. The presented results and up to now experience vol. 48, no. 4, p. 350, 2000.
show that using develop procedure of measurement, radiation [11] S. Müller and P. Massarani, “Transfer-Function Measurement
directivity characteristics of sound source could be obtained in with Sweeps,” J. Audio Eng. Soc., vol. 49, no. 6, pp. 443–471,
an adequate way. Measurement system along with the 2001.
developed software support and measuring and processing [12] M. Ličanin, A. Đorđević, M. Jelenković, Mentor: D. Ćirić,
procedures are well established and provides sufficient “Sensitivity of impulse response measurements with maximum
flexibility and control. length sequences and sweeps”, in Proc XLVI ICEST, pp. 567-
570, Niš, Serbia, 2011.
For the observed configuration cases, applying various
[13] M. Jelenković, D. Ćirić, M. Ličanin, A. Đorđević,
combinations of excitations and disposition of elements “Repeatability of room impulse response measurements”, (in
(loudspeakers), some specific radiation directivity patterns can Serbian), in Proc. LV ETRAN, paper AK2.7, Banja Vrućica,
be achieved. Most of these patterns have the expected forms at Bosnia and Herzegovina, 2011.
lower frequencies - one omni-directional, and two
134
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
smaller than the half of the sample rate, for the given
passband and stop-band requirements, the filter order does not
cos(ω0t ) = ∑g t
m =0
m
m
, (2)
135
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
polynomial approximation of the cosine can be written as: Here ηl(n) is a modulating term. There are altogether N
Ma
modulating terms ηl(n), one for each polynomial segment.
∑∑ b (n)t
N
cos(ω0t ) = m
, (4) Equations (12) and (13) can be used to define a bandpass
m
n =0 m =0 modulated modified Farrow structure, which is shown in Fig.
where 1. The structure can be used for different passband central
frequencies, with a single prototype filter.
(ω0 ) m
(−1) cos(ω 0 a (n)) (m)! for m even, and
m/2
bm = (5)
− (−1) ( m −1) / 2 sin(ω0 a(n)) (ω 0 ) for m odd.
m III. SPECIAL CASES OF MODULATED FARROW
(m)! STRUCTURE
Here, a(n) determines the initial phase of the approximated
cosine function in each polynomial segment. The value of There are several special cases of polynomial modulation,
a(n) can be selected in such a manner that overall in which the process of building the bandpass Farrow
approximated cosine function is symmetric around N/2, structure can be further simplified. These special cases are
a(n)=n+0.5, for n=0, 1…N-1. In this way, the impulse derived from mutual relation between the desired central
response of modulated lowpass prototype filter is also frequency f0= ω0/2π and the sample frequency of the bandpass
symmetric. In the actual implementation, the symmetry can be filter Fs=1/T. If the central frequency is an integral multiple of
exploited in a similar way as for polynomial-based filters, the the sample frequency, integral multiple of the half or quarter
polynomial in t can be transformed to polynomial in (2t-1) of the sample frequency then the modulating term ηl(n) has
thus we obtain special values as shown in a sequel.
The most straightforward case of modulated Farrow
Ma Ma
structures is that with the modulating frequency of kFs. All
∑∑ b (n)(2t − 1) = ∑∑ b (n) f
N N
cos(ω 0t ) = m
m
m m
(n, T , t ) . (6) that is needed is to multiply the output of the lowpass Farrow
n =0 m=0 n=0 m =0
structure with a cosine at kFs, i.e., when the modulation
The modulated impulse response of the polynomial based frequency is an integral multiple of Fs, the cosine generation
filter is obtained by multiplying the impulse response of the is simplified by:
lowpass prototype filter by cosine:
(ω ) m
(−1) m / 2 (−1) k 0 for m even, and
hm (t ) = ha (t ) cos(ω0t ), (7) bm = (m)! (13)
yielding to: 0 for m odd.
M Ma
∑∑ ∑
N
hm (t ) = c m
( n ) f m
( n, T , t ) bm1 (n) f m1 (n, T , t )] . (8) Therefore, bm depends only on polynomial order m, and
n=0 m =0 m1 =0 integral multiple k, reducing (12) to
Ma
The modulated impulse response is a piecewise polynomial η l = ∑ bm (2 µ l − 1) m . (14)
with the same number of polynomial segments as the lowpass m =0
136
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
b m ( n) =
Z Z Z
(15)
− (−1) ( m−1) / 2 (−1) n (−1) k 0 for m odd
(m)! (-1) k+N-1
2µl − 1 y(l)
Fig. 3. illustrates the modulated Farrow structure for
modulation frequencies (2k+1) Fs/2. As above, modulation at Fig. 3. The modulated Farrow structure for center frequencies
(2k+1)Fs/2.
(2k+1)Fs/2 is attained simply by multiplying by ηl(n). and by
alternating the sign of coefficients cm(n) for odd n.
( 2 k +1) n −1 k −1
π (ω ) m
(−1) (−1) (−1) 2 cos( ) 0
m/2
Let us consider modulating the impulse response by a 2
for m even
4 (m)! (23)
cosine at the frequency (2k+1)Fs/4. In each polynomial b m ( n) =
− (−1) ( m−1) / 2 (−1) 2 (−1) 2 sin( π ) (ω0 )
( 2 k +1) n −1 k −1 m
beneficial to decompose the mth-degree subfilter into two
2 2 ( m)!
polyphase branches:
After applying series of trigonometric identities, the
coefficients bm(n) are reduced to: c m 0 ( n) = c m ( 2n)
(24)
cm1 (n) = cm (2n + 1).
m ( 2 k +1) n−1
π (ω ) m
137
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
Arrange sign
x(nl) based on n, and k
2µl-1
ηl 1
In order to illustrate the effectiveness of the proposed Fig. 6. The frequency response of the filter modulated by 3Fs/4.
modulation method for the design of bandpass Farrow
structure we use several illustrative examples. The first step is
the design of the lowpass prototype filter with passband edge
fp=0.3Fs, stopband edge fs=0.5Fs, required stopband
attenuation As=60dB, and passband tolerance δp=0.1. The
filter, with performance shown in Fig 5., is designed using
minimax design of [2], having N=14 polynomial segments,
and polynomial degree M=4.
The next step is to build the bandpass filter by modulating Fig. 7. The frequency response of the filter modulated by 2Fs.
the obtained lowpass prototype. We use two example cases,
with central frequencies of 3Fs/4 and 2Fs. The corresponding Optimization of Energy-efficient Computer and
polynomial-based modulation function that approximates Communications Systems.”
cosine has the same length N=14, and polynomial order Ma=7
for 3Fs/4, and Ma=19 for 2Fs. According to Section 3, there REFERENCES
are 10 additional multiplications to produce modulation by
frequency 3Fs/4, and also 10 to produce modulation by [1] C.W. Farrow, “A Continuously Variable Digital Delay
frequency 2Fs. Frequency domain performances of modulated Element,” IEEE Int. Symp. Circ. Syst., pp. 2641–2645, Espoo,
bandpass filters are shown in Figs. 5 and 7 respectively. Finland, 1988.
Though there is a slight degradation of performance in [2] J. Vesma and T. Saramäki, “Polynomial-based interpolation
stopband, the filtering requirements can be met by over Filters - Part I: Filter synthesis,” Circuits, Systems, and Signal
designing the lowpass prototype filter. Processing, vol. 26, no. 2, pp. 115-146, March/April 2007.
[3] D. Babic, T. Saramäki, M. Renfors, “Conversion between
arbitrary sampling rates using polynomial-based interpolation
V. CONCLUSIONS filters,” in Proc. 2nd Int. TICSP Workshop on Spectral Methods
and Multirate Signal Processing SMMSP’02, pp. 57-64,
We have presented a modulated Farrow structure, which Toulouse, France, 2002.
allows band-pass realization with arbitrarily high centre [4] R. Zukunft, S. Haar, T. Magesacher, “Digital interpolation in
the passband domain,” Proc. IEEE Int. Conf. Acoust. Speech
frequencies without increasing the polynomial degree of the
Signal Proc. (ICASSP), pp. 1545–1548, Orlando, USA, 2002.
lowpass prototype Farrow filter. The modulating function is [5] H. Johansson, “Farrow-structure-based reconfigurable bandpass
constructed as a low-order polynomial in order to avoid costly linear-phase FIR filters for integer sampling rate conversion,”
generation of trigonometric functions. The non-idealities of IEEE Trans. on Circuits and Systems II: Express Briefs, (58), 1,
the modulating function are then mitigated by taking them pp. 46-50, 2011.
into account when optimizing the filter coefficients. [6] D. Babic, “Polynomial-based filters in bandpass interpolation
and sampling rate conversion,” Proc. Int. Workshop on Spectral
Methods and Multirate Signal Processing (SMMSP), pp. 31–37,
ACKNOWLEDGEMENTS Florence, Italy, 2006.
[7] Greenberg, Michael, Advanced Engineering Mathematics (2nd
This work was supported by the Serbian Ministry of ed.), Prentice Hall, ISBN 0-13-321431-1, 1998.
Science under technology development projects: TR32028 – [8] D. Babic, “Piecewise Polynomial Approximation Based on
“Advanced Techniques for Efficient Use of Spectrum in Taylor Series with Efficient Realization using Farrow
Structure,” the 9th Int. Conference TELSIKS 2009, pp. 241-
Wireless Systems” and TR32023 – “Performance
244, Niš, Serbia.
138
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
Abstract – The software model of Adaptive Linear Prediction average component and correlation function Rx ( r ) for:
Codec for one dimensional signals is developed. The presented
codec is simulated on Simulink for Matlab 6.5 environment and r = 0 , n − 1 . Then the basic equation of the linear prediction
the obtained results for real sound signals are evaluated by the will be presented by the following way:
calculation of MSE and SNR for the decoded signals. n−1
Keywords – Digital Signal Processing, Linear Prediction,
Adaptive Data Compression, Matlab Simulation.
x̂( i ) = a1 x( i − 1 ) + ........ + an−1 x( i − n + 1 ) = ∑ a x( i − k ) ,
k =1
k (1)
139
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
- multiplication unit;
[Rx ] = x
R ( 0 ) Rx ( 1 )
Rx ( 1 ) Rx ( 0 )
Fig. 5. Output predicted signal x̂( i ) .
140
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
The input test signal and output predicted signal are shown On Fig.8 the input signal and the error signal are visualized
on Fig.4 and Fig.5 respectively. On Fig.6 the input and output together.
signals are shown together (visualized from the oscilloscope
Scope 4). On Fig.7 the same signals are visualized by the
zooming in horizontal direction (from 0.031s to 0.0324s).
IV. CONCLUSION
An adaptive method for coding of one-dimensional digital
signals, based on the linear prediction and Least Mean Square
(LMS) weight coefficients adaptation of the prediction filter is
presented. From the developed mathematical equations an
algorithm and a general block scheme of adaptive linear
prediction codec is synthesized and experimental results from
the simulation by Simulink for Matlab 6.5 environment for
test signals in WAV format are given
The developed ADPCM codec provides minimum
processing error and lied to increase of PSNR with about 0.3
dB in comparison with 2 coefficients non-adaptive prediction
codec.
The presented simulation model can be used in digital
signal processing for spectral analysis, coding and
transmission of one-dimensional signals and in distance
Fig. 6. Input and output predicted signal MUX{ x( i ) , x̂( i ) }. learning by the using a Matlab Web Server.
The developed image codec is used in laboratory work on
the disciplines: "Image and Signal Processing" and "Audio
and Video Communication on Internet" and in the
experimental work in laboratory "Electronic System for
Visual Information" in Technical University of Sofia.
V. ACKNOWLEDGEMENT
The authors thank the National Fund for Scientific
Research of the Bulgarian Ministry of Education and Science
for the financial support by the contract VU-I-305/2007.
VI. REFERENCES
[1] D. Stranneby, W. Walker, Digital signal processing and
applications, Elsevier, 2004.
Fig. 7. Input and output signal MUX{ x( i ) , x̂( i ) } (zoomed). [2] S. Mitra, Digital signal processing. A computer-based
approach, Mc Graw Hill, 2006.
[3] V. Madisetti, D. Williams, Eds. The Digital Signal Processing
Handbook, CRC Press, 1998.
[4] A. D. Poularikas. The Transforms and Applications Handbook,
Second Ed., CRC Press, 2000.
[5] G. Blanchet, M. Charbit, Digital Signal and Image Processing
Using MATLAB, ISTE, 2006.
[6] B. Widrow, S. D. Stearns. Adaptive Signal Processing.
Engelewood Cliffs, New York, Prentice-Hall, Inc., 1985.
141
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
142
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
143
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
~s p ( 0 ,0 )
k ~k p
[S0 R( 2 n )] = [T0( 2 n )][BR( 2 n )][T0( 2 n )], (6) pR 4 − 1 − 3 − 2 d pR ( 0,0 )
s p ( 0 ,1 ) 1 4 3 2 d pR ( 0 ,1 )
~ k ~k p
1
pR = . (11)
where [T0( 2 n )] is a matrix with dimensions 2n×2n for level р ~ ~k
s pRp ( 1,0 ) 4 4 − 1 1 − 2 d pRp ( 1,0 )
k
k
= 0 which is used for implementing the DCT.
~ p
4 − 1 1 2 ~ k p
The rest components in decomposition (3) are the s pR ( 1,
1 ) d pR ( 1,
1 )
approximation matrices for p = 1, 2. Each of them consists of
sub-matrices with dimensions 2n-p×2n-p for kp=1,2,.,4p The difference matrix [E p −1,R( 2 n − p )] for level р containing
obtained by its quad-tree split. On the other hand each sub-
[E p −p1,R( 2 n − p )]
k
matrix is calculated by: the sub-matrices is determined by the
~k ~k following equation:
[E p −p1,R( 2 n − p )] = [T p( 2 n − p )] −1[S pRp ( 2 n − p )][Tp( 2 n − p )] −1
(7)
[E p −1,R ( 2 n − p )] =
for kp=1,2,.,4p. Here 4p is the number of the branches of the ~
[B R ( 2 n )]-[B 0 R ( 2 n )] − for p = 1;
quad-tree in level p of the decomposition; [T p( 2 n− p )] −1 - = (12)
n− p ~
matrix for inverse 2D-DCT; [S~pR [E p − 2 ,R ( 2 )] − [E p −2 ,R ( 2 )] − for p = 2.
n-p
( 2 n− p )] - the transformed
kp
144
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
III. EXPERIMENTAL RESULTS classical JPEG approach. Here the block effect is much more
suppressed.
Two test images were used with the proposed approach
called Flower and Gargoyl. They are 8 bpp (bits per pixel) IV. CONCLUSION
grayscale images with size 512×512 pixels shown in Fig. 1.
Lossy compression was applied over them with 3 levels of the In this paper a new approach is presented for highly
IPD after the Haar transform with 1 level of decomposition efficient image compression using wavelet and inverse
into 4 sub-bands –from LL to HH. On each level of the pyramid decomposition. The quality and the compression
pyramid the 4 lowest frequencies in the DCT spectrum were level of the images could be smoothly controlled by choosing
retained when working with n = 4, 3 and 2 respectively, that is different levels of both the decompositions and the
DCT transform matrix of 16×16 for 0th level, 8×8 – for the 1st quantization mask for the pyramid at given level. Progressive
and 4×4 – for the last one. image transmission from level to level is possible which
To compare the obtained results in terms of quality and proves to be very useful in the case of narrow-band
compression levels LuraWave SmartCompress 3 [7] communication channels.
application was used to compress the test images using the Incorporating the advantages of the wavelet decomposition
JPEG2000 standard (in JP2 format). The results are given in which minimizes the block effects due to the absence of
Table 1. Lossless compression is also possible by preserving localizing properties with the strong decorrelating properties
the residual after level 2 in the pyramid but which here is of the orthogonal transforms such as DCT it is possible now to
omitted. have strongly compressed digital images which when restored
In the range between 0,5 and 2 bpp for the compression have low presence of artifacts. As it is obvious from
ratio (CR) there is tangible overweight in the PSNR achieved experimental results higher compression ratios are achieved at
by the proposed approach over the JPEG2000 algorithm from equal image quality levels compared to some popular
about 4 dB for the higher ratios to around 0,05 dB. Obviously algorithms from the practice such as JPEG2000. This makes
going towards lossless compression both algorithms tend to the proposed approach a suitable candidate for further
flatten the results they achieve. And the opposite, with the improvement and establishing a new codec design for highly
reduction of the CR the inverse pyramid decomposition over efficient image compression.
the wavelet spectrum of the image produces higher quality
restored images at equal compression levels.
ACKNOWLEDGEMENT
TABLE I
COMPRESSION RESULTS This paper was supported by the National Science Fund of
Flower Test Image Gargoyl Test Image the Bulgarian Ministry of Education, Youth and Science
CR,
PSNR, dB PSNR, dB (Contract – DDVU 02/13 – “Public and Private Multimedia
bpp
IPD JPEG2000 IPD JPEG2000 Network Throughput Increase by Creating Methods for
0,5 34,772 30,876 28,689 27,594 Assessment, Control and Traffic Optimization”).
1 35,698 34,952 29,075 28,632
2 36,615 36,560 29,351 28,691 REFERENCES
The visual analysis of the restored images from both [1] K. R. Rao and P. Yip, The Transform and Data Compression
algorithms (Fig. 1) reveals the same tendency – for low CR Handbook, CRC Press, Boca Raton, USA, 2001.
levels most of the smaller details are preserved in almost [2] G. Wallace, “The JPEG Still Picture Compression Standard”, In
identical way for IPD and JPEG2000. At the same time large IEEE Transactions on Consumer Electronics, Vol. 38, Issue 1,
homogenous areas are clean from any additional artifacts pp. 18-34, 1992.
introduced by the compression. But when CR begins to [3] J. Walker and T. Nguyen, “Wavelet-Based Image
decrease considerably JPEG2000 blurs most of the smaller Compression”, Handbook of Transforms and Data
Compression, Ch. 6, pp. 267 - 312, CRC Press, Boca Raton,
details in the image mainly because of the quantization of the
2000.
wavelet spectral coefficients and specially of the low-level [4] S. Jacob and A. Cheeran, “Wavelet Based Image Compression”,
HH components. In the new approach where IPD is used no In Proceedings of the International Conference and Workshop
quantization of the wavelet spectrum is applied directly. The on Emerging Trends in Technology ICWET’10, Mimbai, India,
second transform in the pyramid (DCT) produces highly p. 999, 2010.
efficient decorrelation of these coefficients and even then they [5] A. Skodras, C. Christopoulos, and T. Ebrahimi, “The JPEG
are being quantized for the given level retaining the error for 2000 Still Image Compression Standard”, IEEE Signal
the next level. In such a way much smoother transition is Processing Magazine, Vol. 18, Issue 5, pp. 36-58, 2001.
guaranteed from level to level not omitting the details from [6] R. Kountchev and R. Kountcheva “Image Representation with
Reduced Spectrum Pyramid”. Book chapter in: "New Directions
the image in intolerable degree. Another major advantage is
in Intelligent Interactive Multimedia", Eds. G. Tsihrintzis, M.
the almost full absence of artifact distortions in the even areas Virvou, R. Howlett, L. Jain, Springer, Berlin, pp. 275-284,
because of the properties of the wavelet spectrum which is 2008.
used in a first place but not the original image as it is with the [7] http://www.luratech.com
145
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
a) b)
c) d) e)
f) g) h)
i) j) k)
l) m) n)
Fig. 1. Visual test results: a) original Flower image; b) original Gargoyl image; c) IPD 0,5 bpp; d) IPD 1 bpp; e) IPD 2 bpp; f) JP2 0,5
bpp; g) JP2 1 bpp; h) JP2 2 bpp; c) IPD 0,5 bpp; d) IPD 1 bpp; e) IPD 2 bpp; f) JP2 0,5 bpp; g) JP2 1 bpp; h) JP2 2 bpp.
146
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
Keywords – Binarization, local thresholding, integral images, II. ADAPTIVE LOCAL BINARISATION ALGORITHM
Wiener filter.
AND BLOCK DIAGRAM
1
Antoaneta Popova is with the Faculty of Telecommunications at
Technical University of Sofia, 8 Kl. Ohridski Blvd, Sofia 1000, Fig. 1. Integral image feature computation
Bulgaria, E-mail: antoaneta.popova@tu-sofia.bg.
147
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
For example the sum of the 4 right-down pixels (3, 7, 5, 6) The main algorithm steps are the following:
of the input grayscale image block is calculated faster from 1 step: A color image conversion to grayscale image Ig is
the elements of the integral image (right block in Fig. 1) done, allowing color depth 2/24/32 bits:
without using the top row and the left column of the input
image: I g 0,3.R 0.59.G 0.11.B . (7)
3 7 5 6 (1 39) (9 10) . (4) 2 step: Integral image, local mean and variance calculation
is applied according to the above description.
Then the local mean m(x,y) for any window size w is 3 step: Wiener (optimal) image filtration is selected for a
computed by using two addition and one subtraction preprocessing stage as more effective and faster, with low
operations instead of the summation over all pixel values in complexity and giving high accuracy of the OCR results. The
the window: Wiener filtered image is calculated:
w w w w m ( 2 n 2 ).(I g ( x, y) m))
(I ( x , y ) (I ( x , y )
I wf ( x, y ) , (8)
m( x, y ) 2 2 2 2 / w2 (5)
2
w w w w
(I ( x , y ) (I ( x , y )
2 2 2 2 where n is a standard noise variance, defined from the
whole image.
Similarly, the local variance is computed very
efficiently, independent of the local window size w: 4 step: Coarse local image binarization (Sauvola) is applied
first, calculating a threshold for each pixel:
x w / 2 j y w / 2
1
( x, y )
2
2
I g 2 (i, j ) m2 ( x, y) . (6) ( x, y )
w i xw / 2 j y w / 2 ( x, y) m( x, y) 1 k 1 , (9)
R
An adaptive local binarization algorithm block diagram is
presented in Fig. 2. where k parameter has a value 0,2 and R is the defined in
advance dynamic range of the standard variance . This
algorithm uses the mean and the variance around the pixel in a
local area, but threshold is better adaptively calculated for the
background with changed intensity.
A pixel S(x,y) = 1 is accepted as part of the text object if its
grayscale intensity Ig is less than the threshold θ:
S ( x, y ) 1 if I g ( x , y ) ( x, y )
, (10)
S ( x, y ) 0, else
else the pixel is part of the background S(x,y) = 0.
5 step: Image background Bg calculation and interpolation
is performed to obtain an image with background only – the
previously selected text pixels now are interpolated with the
closest intensity of the background pixels. The pixels in the
text object are only changed in this step. The purpose is to
achieve an equalized background for a more successful
following finer binarization:
Bg ( x, y ) I ( x, y ) if S ( x, y ) 0
x dx y dy
( I (i, j ).(1 S (i, j )))
i x dx j y dy , (11)
j y dy y dy
if S ( x, y ) 1
(1 S (i, j ))
i x dx j y dy
where 2dx and 2dy are the size of the operator window
(typically 40х40 px. to cover minimum two characters). If the
Fig. 2. Local binarization algorithm block diagram pixel is part of the background S(x,y) = 0 it has the same
unchanged intensity I(x,y).
148
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
6 step: Fine and final adaptive local binarization over the the window size w is done in Wiener filter (3 px.) for
grayscale input image is applied, taking in account the preserving the character contours, in the local area for Sauvola
calculated background image. The subtraction between the (15 px.) and in the local area for background calculation (40
background and the input image (Bg(x,y) – I(x,y)) gives an px.).
image with the replaced position parts of the text and In order to demonstrate the advantages (speed and ORC
background (darker) and the image can be assumed to be with accuracy after text image binarization) of our proposed
a constant background. algorithm, 5 existing binarization algorithms (IsoData, Otsu,
For the background the pixels Bg(x,y) and I(x,y) are equal Local Mean, Niblack, Sauvola) were tested.
and the background pixel intensities are not considered. The
equation for achieving the fine and final binarized image is:
Used Binarized image and Recognized text
I f ( x, y ) 1 if ( Bg ( x, y ) I ( x, y )) d ( Bg ( x, y )) algorithm
, (12)
0 else Original
where d(Bg(x,y)) is a local threshold for pixel (x,y).
For images with a constant background the value of the
minimal threshold between text and background is:
Otsu
d q. f , (13)
f
x y ( Bg ( x, y) I ( x, y)) . (14)
Niblack
x y S ( x, y )
idini FI; - .___ ii: F
For achieving different adaptive thresholds for different
contrasts between the text and background, the mean value b Sauvola
of the intensity of the grayscale pixels Bg(x,y), belonging to
the coarse binarized text, is calculated using the equation:
b
x y ( Bg ( x, y)(1 S ( x, y))) . (15)
Another ay of understanding the world...
x y (1 S ( x, y)) Suggested
The threshold for the given pixel (x,y) is equal to q.δf., if the algorithm
intensity of the image Bg(x,y) is bigger than p1.b. Else the
threshold is equal to p2.q. δf. The coefficients p1 and p2 are in Another way of understanding the world...
the range [0; 1]. The above is achieved using the
function: Fig. 3. Original image, binarized by Otsu, Niblack, Sauvola and the
d ( B g ( x, y )) suggested algorithm with the corresponding recognized texts
In Fig. 3 is presented the original image with superimposed
1 p2 . (16)
q. f p2 text on a complex background, the binarized images
4 B g ( x, y ) 2(1 p1) comparing the 4 methods - Otsu, Niblack, Sauvola and the
1 exp b(1 p1) 1 p1 suggested algorithm in this paper, and the recognized
characters from OCR system (shown under the binarized
images). After the Otsu global binarization 9 text symbols
cannot be recognized. Using the Niblack binarization many
III. EXPERIMENTS AND RESULTS black pixels pass from the background to the text object. This
is the worst case and no one of 36 characters/ symbols are
The conducted tests include images with text over the recognized. As it is shown in the Sauvola algorithm,
picture, with darker background parts, and different binarization results in the threshold being higher than the
background artifacts. optimal and 3 characters are almost unreadable in the binary
The algorithm implementation is done using program image, but the OCR system helps and only one symbol is not
language C. During the experimental testing the selection of recognized. In the suggested by us adaptive local binarization
149
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
algorithm, the text is maximally readable and all 36 characters complex background, it is easy to evaluate the results by
are recognized. comparing the recognized texts in images.
In this paper we presented a modified algorithm of the
adaptive computing thresholds for local image binarization.
The new approach in this paper is the application of integral
images in the Wiener filter in order to compute the mean and
the variance in the local processing window. This results in
increasing the speed of the thresholding algorithm regardless
of the local processing window size. The second new
approach in the presented algorithm is the computation of the
Sauvola threshold function with integral images in the stage of
coarse binarization in combination with the Wiener filter. The
proposed algorithm includes a fine adaptive binarization
technique that achieves better thresholding compared to
Sauvola, resulting in a higher recognition accuracy of the
image presented in Fig. 3. As a result all text characters are
recognized correctly after applying the described binarization
algorithm. An additional advantage of the developed
algorithm is the reduced time of the binarization process,
Fig. 4. Original image, binarized by IsoData, Mean and the suggested compared to the other local thresholding algorithms. The
algorithm
decreased time is close to the fast global binarization schemes
like Otsu.
The application of the proposed algorithm, as well as
IsoData and Mean algorithms, on test images with dark areas ACKNOWLEDGEMENT
due to bad scanning shows that the suggested approach better
cleans such backgrounds (Fig. 4). This paper was supported by the National Science Fund of
The typical binarization algorithm calculates local image the Bulgarian Ministry of Education, Youth and Science
areas sequentially around each pixel. The calculation (Contract – DDVU 02/13 – “Public and Private Multimedia
complexity presented as a number of operations O is: Network Throughput Increase by Creating Methods for
Assessment, Control and Traffic Optimization”).
C O( N 2 . W 2 ) , (17)
150
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
A. Document Image
I. INTRODUCTION Document text image is a product of the image scanning. It
is a digital gray-level image, which is represented by matrix
The printed text is a strongly formed text type with a D. It consists of M rows, N columns, and contains the
articulated regularity in shape [1]. Accordingly, the letters are elements which intensity has L discrete levels of gray. L is the
of the similar size and the distance between text lines is integer from {0, …, 255}, D(i, j) ∈ {0, …, 255}, where i = 1,
generally sufficient. Hence, the spacing between text lines is …, M and j = 1, …, N. After performing the binarization
decent. The orientation of the text lines is similar, which leads procedure the image represented by matrix D is transformed
to the uniform text skew. These attributes represent the into binary image B(i, j). Its elements are equal to 1 if D(i, j) ≥
relatively predicted characteristics, which simplify the printed Dth(i, j), or to 0 if D(i, j) < Dth(i, j), where Dth is given by any
skew identification. local binarization method [4]–[5]. Dth represents local
However, the text skew extraction represents a severe threshold sensitivity decision value. Currently, document
problem. It is a consequence of the digitization process. image is given as binary matrix B featuring M rows and N
Hence, the text skew occurrence is simply unavoidable. The columns.
existence of this phenomena could cause the optical character
recognition system failing. Hence, its identification represents
one of the crucial steps [2]. B. Log-polar Transformation
Existing methods for the text skew identification can be
grouped as follows [3]: projection profiles method, k-nearest The log-polar transformation is a nonlinear and non-
neighbor clustering method, Hough transforms method, uniform sampling of the spatial domain. Nonlinearity is
Radon transforms method, Fourier transformation method, introduced by polar mapping, while non-uniform sampling is
cross-correlation method, and other methods. the result of logarithmic scaling [6]. Consider the log-polar
This paper recommends a new algorithm based on the coordinate system, where denotes radial distance from the
interaction of the log-polar transformation and cross- center and denotes angle. For the input binary image B(i, j),
correlation. Firstly, it converts images into log-polar space. the center point has been extracted as B(m, n). The radius,
Furthermore, two images are cross-correlated in log-polar which ensures the maximum number of pixels to be included
domain to extract theirs similarity. As a consequence, cross- within reference circle of the conversion is assigned as R.
correlation function called cost function has been obtained. Its Center of the circle is given as m = M/2, and n = N/2 [6].
maximum values represent the angle of the text skew Furthermore, the image is converted into polar coordinate
estimation. The result gives the fractured line with two text system. This way, the input binary image B(i, j) has been
skew values: left and right. These two values represent the transformed into polar domain (r, θ) where [6]:
new elements in the skew estimation compared to the
previously mentioned methods like Hough transform, Radon r = (i − m)2 + ( j − n)2 , 0 ≤ r ≤ R , (1)
1 and
Darko Brodić is with the University of Belgrade, Technical
Faculty in Bor, V.J. 12, 19210 Bor, Serbia, E-mail:
j−n
dbrodic@tf.bor.ac.rs. θ = arctan , 0° ≤ θ ≤ 360° . (2)
2
Zoran N. Milivojević us with Technical College Niš, Aleksandra i−m
Medvedeva 20, 18000 Niš, Serbia, E-mail:
zoran.milivojevic@jotel.co.rs. Furthermore, log-polar transform is given as (ρ, θ) where:
3
Dragan R. Milivojević is with Institute for Mining and
Mettalurgy, Zeleni bulevar bb, 19210 Bor, Serbia. ρ = ln r . (3)
151
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
Applying a polar coordinate transformation to an image 2. Identification of the center point needed for the log-
maps radial lines in Cartesian space to horizontal lines in the polar transformation.
polar coordinate space. 3. Creation of the binary image with normalized ellipse
(ellipse image).
C. Cross-correlation 4. Log-polar transformation of the text image.
5. Log-polar transformation of the ellipse image.
6. Cross-correlation of the text image with ellipse image
Cross-correlation is a measure of similarity of two images.
in the log-polar domain.
In the discrete form, it is given as [7]:
7. Extraction of the maximum values from the cross-
M −1 N −1 correlation function.
cc(i, j ) = B(i, j ) o E (i, j ) = ∑ ∑ B(k , l ) E (i + k , j + l ) . (4) 8. Identification of the left and right side skew angle from
k =0 l =0
the center transformation point.
However, in our case cross-correlation have to be made Step 1.
between the images in log-polar domain. Hence, eq. (4) The original binary text image B is shown in Fig. 1.
should be transformed adequately. Hence, suppose that in the
log-polar domain matrices of text image B and referent object
5
E are marked as BC and EC. Furthermore, cc (in log-polar
domain) that represents the cross-correlation function can be 10
defined as:
10 20 30 40 50 60 70 80
Furthermore, the ellipse is split into left and right half part 40
y
D. Algorithm’s Steps Fig. 2. Ellipse image (ellipse has been normalized according to the
text object).
The algorithm for the estimation of the text skew based on
log-polar transformation is as follows: According to the eq. (1)-(3) log-polar transformation of the
1. Text image extraction by the bounding box (text text and ellipse image is achieved.
image).
152
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
0.6
50
100
0.5
150 0.4
omega
200
0 50 100 150 200 250 300 350 400
θ
250
300 Fig. 5. Cross-correlation of the original text image and ellipse in log
polar domain.
350
20 40 60 80 100 120 140 160 180
r
10
Fig. 3. Log-polar transformation of the original text image.
20
Step 5. 30
In Fig. 4, the log-polar transformation of the ellipse image
40
is shown.
y
50
Left Right
60
50
70
100
80
x
200
Fig. 6. Enlarged original image with the skew line obtained from
250
the log-polar cross-correlation function.
300
153
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
ACKNOWLEDGEMENT
This work is partly supported by the project funded by the
θREF Ministry of Education and Science of the Republic of Serbia,
No. TR33037.
REFERENCES
Fig. 7. Enlarged original image with the skew line obtained from [1] D. Brodic, “The Evaluation of the Initial Skew Rate for Printed
the log-polar cross-correlation function. Text,” Journal of Electrical Engineering - Elektrotechnický
časopis, Vol. 62, No. 3, pp. 142-148, 2011.
[2] P. Shivakumara, G.H. Kumar, D.S. Guru, P. Nagabhushan, “A
IV. RESULTS AND DISCUSSION Novel Technique for Estimation of Skew in Binary Text
Document Images based on Linear Regression Analysis,”
Sādhanā, Vol.30, No.1, pp. 69–86, 2005.
The result of testing is given in Table 1. [3] A. Amin, S. Wu, “Robust Skew Detection in Mixed
Text/Graphics Documents,” Proceedings of the 8th ICDAR ’05,
TABLE I Seoul, Korea, Vol.1, pp. 247–251, 2005.
TESTING RESULTS [4] Sauvola L.; Pietikainen M., “Adaptive Document Image
Binarization,” Pattern Recognition, Vol.33, No.2, pp. 225-236,
θREF (º) θA (º) ΔθA (º) RE(θA) 2000.
0 0 0 - [5] Khasman A., Sekeroglu B., “Document Image Binarisation
1 1 0 0.000 Using a Supervised Neural Network,” International Journal of
2 2 0 0.000 Neural Systems, Vol.18, No.5, pp. 405-418, 2008.
[6] Mrinal Kanti Bhowmik, Debotosh Bhattacharjee, Mita Nasipuri,
3 3 0 0.000 Mahantapas Kundu, Dipak Kumar Basu, “Classification of Log-
4 4 0 0.000 Polar-Visual Eigenfaces using Multilayer Perceptron,”
5 5 0 0.000 International Journal of Image Processing (IJIP), Vol. 4, No. 1,
10 10 0 0.000 pp. 12-23, 2010.
15 15 0 0.000 [7] Gonzalez R. C., Woods R. E. Digital Image Procesing, 2nd edn.
20 20 0 0.000 . – Prentice-Hall, 2002.
[8] D. Brodić, D.R. Milivojević, Z. Milivojević, “Basic Test
25 25 0 0.000 Framework for the Evaluation of Text Line Segmentation and
30 30 0 0.000 Text Parameter Extraction,” Sensors, vol.10, no.5, pp. 5263–
35 35 0 0.000 5279, 2010.
40 40 0 0.000 [9] V. S. Popov, “Principle of Symmetry and Relative Errors of
45 45 0 0.000 Instrumentation and Transducers,” Automation and Remote
50 49 1 0.020 Control, Vol. 62, No.5, pp. 183–189, 2001.
55 56 1 0.018
60 61 1 0.016
V. CONCLUSION
154
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
155
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
156
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
III. DIRECTIONAL WAVELET TRANSFORMS interest (ROI), modified fuzzy C means segmentation, ROI
based modified EZW algorithm ending with modified
The second large group of directional transforms includes Huffman coding. The authors managed to raise the
the wavelet ones. All of them are based on the classical compression ratio from almost 2 times at relatively constant
wavelet transform realized by the lifting implementation (Fig. PSNR around 33 dB for the test MRI images in comparison to
3) [6]. the classic EZW approach and the SPIHT algorithm.
Another approach is the robust adaptive directional lifting
wavelet transform used for image denoising in [3] by Wang et
al. The adaptive directional lifting is at the base of this method
x(n) combining the directional spatial prediction and the
↓2 +
conventional lifting scheme which removes the spatial
l(n) redundancy leaved by the directional attributes. Additional
novelty here is the classification at pixel level and the inter-
z P1(z) U1(z) scale correlation which assure more robustness of the
orientation estimation algorithm. The transform itself is
- applied at pixel level and affecting only those pixels which
h(n) belong to texture regions of interest. The PSNR for filtered
↓2 + images is increased by 7 dB for some typical for the practice
cases.
a) In [4] some optimization is done for the directional lifting
x(n) with reduced complexity. While the major disadvantage of the
+ ↑2 +
l(n) direction-adaptive discrete wavelet transform is the need of
- exhaustive search for the optimal prediction direction which
makes it too complex in contrast to the classical DWT, here
U1(z) P1(z) z-1 lowering of this complexity is aimed. Prediction of the
optimal direction is done using gradient-based technique over
a formal model of the prediction errors generated by the
h(n) directional lifting of input wedge image. Stevens et al. [4]
+ ↑2 proved practically that the prediction step remains very simple
and fast and the total complexity reduction has a factor of 11/4
b) preserving the prediction accuracy. The difference with the
original test images and the coded ones with exhaustive search
and with the optimized algorithm is about or less than 0.5 dB.
Fig. 3. One-pass link for the lifting scheme of the wavelet transform:
a) analysis filter bank and b) synthesis filter bank Similar algorithm to that described in [3] is presented in [5]
by Chang and Girod. They use local adaptation of the filtering
The prediction P(z) and update U(z) filters are at the base of directions to the image content based on directional lifting.
the analysis and synthesis filter banks of the DWT. One of the The advantage is that energy compaction is more for sharp
most often filters used in this process are the 9/7 biorthogonal image features. Additionally anisotropic statistical image
wavelet filters described in [6] by: model is created for quantifying the gain achieved by adapting
the filtering directions. In such a way the authors claim that
this algorithm is even more effective than similar ones
P1 = +1.58613(1 + z −1 ) developed earlier and gain of up to 2.5 dB for the PSNR is
+1 achieved. No loss of image structure is reported in the
U1 ( z ) = −0.05298(1 + z ) processed pictures.
P2 = −0.88291(1 + z −1 ) . (6) Kamisli and Lim propose in [6] the directional wavelet
transform to be used for prediction residuals in the video
U 2 ( z ) = +0.44350(1 + z +1 ) coding process. They clearly distinguish the coding of
prediction residuals of frame intensities such as the motion
s1 = 1.23017 s 2 = 1 / s1 compensation residual and the resolution enhancement
residual. Special attention is dedicated to the specific
Here the odd samples are predicted by two neighbouring even characteristics of the different prediction residuals and how
pixels which are first averaged and then the result is scaled they differ from those of the image (frame) itself. Adapting
while the even ones are predicted by averaging of two the model for the directional transforms used then produce
neighbouring odd pixels of the prediction residual. better results than to unify one and the same algorithm for
In [2] an efficient embedded coding is suggested for both. The experiments carried out by Kamisli and Lim
medical image compression using the contourlet transform. It indicate that coefficient savings over the classical DWT are
is an extensive scheme which incorporates discrete contourlet between 1 and 40 % with an average close to 30% and
transform, laplacian pyramid, directional filter bank, some considerably more in some cases when DDWT model is
post noise removal steps, optionally extraction of region of adapted to the specific type of residual being processed.
157
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
158
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
I. INTRODUCTION
Fig. 1 – Arm of the form
The researches related to the normalization of the stability
of a ship meet significant difficulties caused by the ignorance
of its hydrodynamic interaction with the water. The empirical-
statistic method widely covers in the introduction of certain
norms for stability in the design and exploitation of the
vessels. The research of the stability could be most clearly
made with graphical interpretation of the so called Static
Stability Curve (SSC). The direct building of the curve is too
hard for the command staff because of the many calculations.
Therefore, a new method is presented in “Method for
calculating the stability at moderate and big heeling angles of
a vessel”. It simplifies the graphic work on creating SSC and
initiating a diagram of the dynamic height of the mass centre
(DHMC). An algorithm and a program module are created
Fig. 2 – KN-curves of freight passenger ship [1]
using this method. The program module is realized on Matlab
[3].
2. For each i are taken heights of the mass centre KG j in
II. ALGORITHM realistic exploitation borders for the height of the mass centre
G throughout 0.1m .
The sequence of the algorithm based on the new method for 3. The arm of the height (lG ) is calculated for each KG j ,
obtaining the border graphical dependence between the mass
centre and the displacement of the ship is the following: heeling angle and i by the formula [1,3]
1. The values ( KN ) j (Fig. 1) are determined from the (lG ) j KG j sin , (1)
KN -curves for each displacement i from 1 " empty" to where is from 10 to 40 throughout 10 . [3](Fig. 3)
0 0 0
1 2
Mariya Nikolova, 3Mariya Eremieva,
Emiliya Koleva, viktoriya_sabeva@yahoo.com,
eremievam@abv.bg,
4
Viktoriya Sabeva
mpn@abv.bg, are with the Engineering Faculty at Naval
emiliya_f@abv.bg.
Academy “Nikola Yonkov
eremievam@abv.bg, Vaptsarov”, 73 Vasil Drumev str, Varna
viktoriya_sabeva@yahoo.com,
9026, Bulgaria,emiliya_f@abv.bg.
mpn@abv.bg,
e-mails respectively: Fig. 3 – Arm of the height
emilia_f@abv.bg, mnp@abv.bg, viktoriya_sabeva@yahoo.com,
eremirvam@abv.bg
159
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
4. The arm of the righting moment GZ i, j is evaluated for For each i are built j in number diagrams respectively
Fig. 5 – Initial transverse metacentre displacement i . The graph of KG j f ( i ) is built for the
whole diapason 1 n . The area over the graph is
impermissible for the cargo height[1,4].
For the calculations in this report are used values from the
Naval Academy’s training ship’s documents.
3
The displacements i are from 1 4000m to
n 10000m at intervals of 500m .[6]
3 3
Fig. 6 – Determining the height of the transverse The heights of the mass centre KG j from KG1 6m to
metacentre [1]
KG m 9m at intervals of 0.1m .[6]
The heights of the transverse metacentre are taken from the
6. The transverse metacentric heights G j M i are determined
KM -curve of a freight passenger ship for each displacement
as
G j M i KM KG
i j (2)
i [6].
The program is created following the steps shown in the
for each i . flowchart. (Fig. 8)
Finally an acceptable zone for dynamic stability is
7. The Static Stability Curve (SSC)
GZ
determined. (Fig.9)
i, j f ( ) . (3)
160
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
CONCLUSIONS
REFERENCES
Fig. 9 - Diagram of the dynamic height of the mass centre [1] M. Zhelyazkov, P. Kaloyanchev, “Book of problems based on
ships theory”, Military publisher, 2001
[2] Matlab help
[3] P. Petkov, V. Petkova, I. Draganov, “Theory of the ships and
ships construction”, Steno, 2008
[4] STCW Module 7-Ship Construction, Stability and Damage
Control.
[5] STCW Module 17-Introduction to Ships.
[6] Rezolution А 749 (18) of IMO-requirements for SSC.
161
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
Begin
Enter values of
, KN and i, j , k 1
KM
no yes
Plot the i≤13
graph for all ( KN k ) i
KG max
Store KG max i
GZ
i, j
KN k i lG k j
no
k k 1
yes
k≤4
If yes
S1 , S 2 , S3 IMO
no
j = j+1
162
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
163
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
corrupted task must not violate timing constraints of any task Input: operating frequency levels fj (j=1..m),
in Γ. characteristics for n real time tasks (Ci, Di, Ti, pi),
For checking the feasibility of fault tolerant real-time task fault tolerant constraint (TF)
set we use the response time analysis (RTA). In the RTA, the _______________________________
fault-tolerance capability of a RTS is represented by a single
parameter, TF, which corresponds to minimum time interval (1) for each Task in TaskSet set Task’s_Freq to fm and set
between two consecutive faults that the RTS can tolerate. Task’s_Key to true;
More about RTA can be found in [8], [9]. The basic equation (2) repeat step (3) to (7) until there are true Task’s_Key in the
characterize for RTA is Eq. (1). TaskSet;
(3) for each unlock Task in TaskSet do
(4) temporarily set Task’s_Freq to Lower_Task’s_Freq;
⎡ Rn ⎤ ⎡ Rn ⎤
Rin + 1 = Ci +
(1) (5) if new TaskSet is not feasible
∑ ⎢ i ⎥C + ⎢ i ⎥ max ( C )
⎢ T j ⎥ j ⎢ T F ⎥ j∈hp( i )∪ i j (6) then set Task’s_Key to false;
j∈hp( i ) ⎢ ⎥ ⎢ ⎥
(7) else calculate ΔPower as Power(Task’s_Freq) –
Power(Lower_Task’s_Freq);
With Eq. (1) the response time Ri of a task τi could be (8) find Task with maximum ΔPower and set Task’s_Freq to
calculated. This equation has three main addends. The first is Lower_Task’s_Freq;
WCET Ci for a task τi. The second presents interference due
to preemption by higher priority tasks. We use hp(i) to denote _______________________________
the set of tasks with higher priorities than i, hp(i)={τj∈Γ⎪pj > Output: TaskSet with new frequency assigne to each Task
pi}. The third addend refers to possible faults in the system. If
we assume that inter-arrival time between faults is TF then
⎡R ⎤ Fig. 1. Pseudo code of the proposed algorithm
there can be at most ⎢ i ⎥ faults during the response time Ri
⎢ TF ⎥ The algorithm starts with assigning the maximum operating
of task τi. Since these faults could occur during the execution frequency, fm, to each real-time task, step (1). Also, at the
of task τi or any higher priority task which has preempted τi, beginning, all tasks are allowed to change the frequency - we
each fault may add max ( C j ) to the response time of say that all tasks are unlocked. An iteration of the algorithm
j∈hp( i )∪i decreases the frequency of one task for one frequency level.
task τi. So, the third addend in Eq. (1) presents an extra time The chosen task is one for which the frequency decrement
needed tasks recovery due to faults. yields maximum power reduction among all unlocked tasks
Since Ri appears on both sides Eq. (1) is recurrence provided that tasks set remains feasible. To find such task, the
relations which starts with Ri0 = Ci . The solution is found when algorithm checks all currently unlocked task. For example,
frequency index of one unlock task τi is temporarily decreased
Rin + 1 = Rin . If during the iteration process we get that
for one frequency level, i.e. from fj to fj-1, step (4), and
Rin +1 > Di then task τi is infeasible and iteration process must feasibility of task-set is tested using Eq. (1), step (5). If task-
be terminated. set is not feasible, τi is locked, step (6). Otherwise, if task-set
is feasible, the difference between power consumption of τi at
lower (fj-1) and higher (fj) frequency is calculated, step (7).
B. Algorithm description Then, τi’s frequency is changed back to fi. After checking all
tasks, one that remains unlocked and provides the maximal
In order to solve the tradeoff problem between low energy power reduction is selected, and its frequency index is
consumption and high fault-tolerance, we propose one decremented, step (8). Additionally, the selected task is locked
heuristic DVFS algorithm. The proposed algorithm has to find if its new frequency equals 1, i.e. corresponds to the lowest
appropriate execution frequency for each task, from the real- execution frequency, f1. After that, the algorithm enters the
time tasks set, such that energy consumption is minimal when next iteration. The algorithm finishes when there are no more
faults are presence. Fig. 1 gives the algorithm in pseudo code unlocked tasks. The frequency assignment to each task is
form. algorithm’s output. We previously proved the proposed
For this purpose we created a heuristic-based algorithm to heuristic algorithm and more about that can be found in [10].
The RTA is the basic of our proposed algorithm. This analysis
is used to guarantee feasibility of real-time tasks set and fault
tolerance. The input parameters for the algorithm are: III. SIMULATION RESULTS
- frequency fj (j=1,..., m) where fj < fj+1 and m is number
of frequency levels; We realized simulator based on our proposed heuristic
- characteristics for all n real-time tasks from the set: DVFS algorithm. The input parameters of the simulator are
period Ti, worst case execution time Ci, priority pi and number of real-time task and their real-time characteristics:
deadline Di, for i=1,..., n; minimum inter-arrival time Ti, worst case execution time Ci
- minimum time interval between two consecutive faults on maximum operating frequency fm, deadline Di and priority
TF. pi. Also, input parameters are processor’s voltage and
frequency levels and fault constraints TF.
164
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
TABLE I
TASKS SET FROM GENERIC AVIONICS PLATFORM
Ti=Di Ci
τi pi
(ms) (ms)
Nav_Status 1 1000 1
BET_E_Status_Update 2 1000 1
Display_Stat_Update 3 200 3
Display_Keyset 4 200 1
Display_Stores_Update 5 200 1
Fig. 2. Power consumption according to number of frequency
Nav_Steering_Cmds 6 200 3 levels in the absence of faults in the RTS
Tracking_Target_Upd 7 100 5
It can be concluded that power reduction is better when
Display_Hook_Update 8 80 2 more voltage levels are included. The maximum energy
Display_Graphic 9 80 9 savings is 42.8% for 5 levels and the minimum savings is
31.5% for only 2 frequency levels. The energy reduction is
Nav_Update 10 59 8
significant even for low number of frequency levels and this
clearly shows the effectiveness of our proposed algorithm.
We performed simulations with a number of synthesized Our next step, in the simulation process, was to consider
real-time task sets and few real-world applications. The possible faults appearance in the RTS. This is represented by a
characteristics of one real-world application are summarized single parameter, TF, which corresponds to minimum time
in Table I. It is a task set taken from the Generic Avionics interval between two consecutive faults that the RTS can
Platform (GAP) used in [11]. For the processor’s frequency tolerate. For the input parameters of the simulator we used the
levels we used data for Transmeta Crusoe procesor from [12]. same task set and the same processor. Fig. 3 shows the
The relevant parameters for the processor are listed in Table simulation results for different number of available frequency
II. levels. We used the same sets of frequencies (667MHz,
300MHz), (667MHz, 600MHz, 300MHz), (667MHz,
TABLE II 600MHz, 400MHz, 300MHz), (667MHz, 600MHz, 533MHz,
PROCESSOR FREQUENCIES, VOLTAGES AND POWER 400MHz, 300MHz). The x-axis of the Fig. 3 represents the
ratio of TFmax to TF. TFmax is minimum time interval between
CPU CPU two consecutive faults that the task set can tolerate on
Voltage
Frequency Power maximal executing frequency and TF is input simulation
(V)
(MHz) (W) parameter. This axis represents the normalized TF value which
300 1.2 1.3 is proportional to fault tolerance of the task set. As fault
400 1.225 1.9 tolerance proportional to time redundancy this axes also could
533 1.35 3 represent free slack time in the systems. The y-axis represents
600 1.5 4.2 the power saving with respect to the power consumption at
667 1.6 5.3 maximum frequency calculated in percents.
According to number of available frequency levels the
First, we assumed that there were no faults in the system. simulation was done for four possible scenarios. All four
With this assumption, we used our proposed algorithm to find scenarios indicate the same fact that power reduction leads to
the appropriate execution frequencies for each real-time task less fault tolerance and vice versa. Now due to simulation
that lead to the maximum energy savings. Fig. 2 shows the results, we can better perceive the tradeoff between power
simulation results for GAP task set and Transmeta Crusoe consumptions and fault tolerance. For example, let’s suppose
processor. We performed simulation for different number of that power reduction demands are between 40% and 45%. It
available frequency (voltage) levels. That is represented on can be seen, from the Fig. 3, that processor with 4 or 5
the x-axis where 2, 3, 4 and 5 frequency levels include set of frequency levels could fulfill these demands. Also, fault
frequencies (667MHz, 300MHz), (667MHz, 600MHz, tolerances vary for the given power reduction interval. The
300MHz), (667MHz, 600MHz, 400MHz, 300MHz), best is to choose one with maximal tolerances.
(667MHz, 600MHz, 533MHz, 400MHz, 300MHz) Also, it can be concluded that power reduction is better
respectively. The y-axis represents the power reduction when more voltage levels are included. With larger number of
calculated in percents. This reduction is presented as power frequency levels there are more possible task-frequency
saving with respect to the power consumption at maximum mapping, so the chance of finding solutions with lower energy
frequency. becomes higher.
165
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
Fig. 3. Power consumption according to fault tolerance for different number of frequency levels
166
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
167
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
II. OBSERVATIONS AND DISCUSSIONS instances in the ontology of the domain of application.
Integrated with the ontology is the inference engine, which
Herring et al. (2004) defined three types of blogs: personal can deduce implicit relations from the ontology. All the blog
journals, “filters” (because they select and provide entries related to the relevant ontology instances are obtained
commentary on information from other websites) and from the blogontology mapping. The total relevant blog
“knowledge logs”. The majority of blogs are the online diary entries obtained are finally organized into an aggregated and
type. Bloggers are interested in reading new information, navigable collection by the organizer. The system also
sharing knowledge and being connected with other users. produces output in RSS format which computers can
While blog writers are more extroverted, blog readers are understand and aggregate.
more consumerist.
168
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
REFERENCES
[1] Bates, T. (2011), E-Learning Outlook for 2011
http://www.tonybates.ca/2011/01/16/e-learning-
outlook-for-2011/
[2] Bates, Tony (2010), Blackboard acquires Elluminate and
Wimba: the end of LMSs?
http://www.tonybates.ca/2010/07/11/blackboard-
acquires-elluminate-and-wimba-the-end-of-lmss/
[3] Boulos, M. N. K., Maramba, I. & Wheeler, S. (2006)
Wikis, blogs and podcasts: A new generation of web-based
tools for virtual collaborative clinical practice and education,
BMC Medical Education, 6(41).
http://www.biomedcentral.com/ content/pdf/1472-
6920-6-41.pdf (Last visited January 2011)
[4] Breslin, J.G, S. Decker (2007), "The Future of Social Networks
on the Internet: The Need for Semantics", IEEE Internet
Fig. 3. Edu-blog for Choreography Computing, vol. 11, no. 6, pp. 86-90pp.
[5] Cayzer, S. (2004a). Semantic blogging and decentralized
knowledge management. Communications of the ACM, 47(12):
47-52. http://portal.acm.org/
citation.cfm?id=1035164&coll=GUIDE&dl=ACM&CFID=4
9 229987&CFTOKEN=13649580&ret=1#Fulltext
[6] Cayzer, S. (2004b). Semantic Blogging: Spreading the Semantic
Web Meme. http://citeseer.ist.psu.edu/698724.html Last
visited July 2011
[7] Chao, J. (2007) Student project collaboration using Wikis.
Proceedings of the 20th Conference on Software Engineering
Education and Training (CSEE&T2007), Dublin, Ireland: July
3-5.
[8] Chatti, M.A., Jarke, M. and Frosch-Wilke, D., (2007). The
Future of e-Learning: a Shift to Knowledge Networking and
Social Software, International Journal of Knowledge and
Learning, IJKL, 3 (4), p. 404-420
[9] Chatti, M.A., Srirama, S., Kensche, D. & Cao, Y. (2006).
Mobile web services for collaborative learning, Proceedings of
the 4th International Workshop on Wireless, Mobile and
Ubiquitous Technologies in Education (WMUTE 2006), 16–17
Fig. 4. Edu-blog for Spatial Design November, Athens, Greece.
[10] Godwin-Jones, R. (2003). Blogs and Wikis: Environments for
Online Collaboration. Language Learning and Technology
7(2): 12-16. http://llt.msu.edu/vol7num2/
III. CONCLUSION TO BLOGS pdf/emerging.pdf Last visited July 2011 Stephen Downes, E-
Learning 2.0:Notes from Stephen Downes
Teachers are using blogs to provide up-to-date information http://www.downes.ca/
and commentary on their subject areas, as well as posting http://www.speedofcreativity.org/
questions and assignments and linking to relevant news stories 2006/10/08/elearning-20-notes-from-stephen-downes/
and websites. [11] Gradinarova. B. (2009). Importance of web 2.0- mediated
competence for the educational demands on learners. In
They are preferred tools because they have advantage to Proceedings of the 10th International Conference on Computer
provide reliable and safe information protected from spam. Systems and Technologies and Workshop for PhD Students in
Computing on International Conference on Computer Systems
and Technologies (CompSysTech '09),
Ontology has been introduced to utilize semantic relations, [12] Kakizawa, Y. (2007), “In-house use of Web 2.0: Enterprise
enhanced by inference. Blog entries are mapped to the 2.0”, NEC Technical Journal, Vol. 2 No. 2, pp. 46-9.\
ontology using language processing. Search results are [13] Kirkpatrick, M. (2006) The flu wiki: A serious application of
organized by introducing semantic aggregation. Blog entries new web tools.
are enriched by metadata and an annotation mechanism has http://marshallk.blogspot.com/2005/07/flu-wiki-
also been developed. The framework has been tested and serious-application-of-new.html (Last visited March 2011)
evaluated by implementing a system for the Institute of [14] Lamb, B. (2004) Wide open spaces: Wikis, ready or not.
EDUCAUSE
Technology domain ontology at VFU. Experiments have
Review,39(5) (September/October), 36-48.
shown quite good results. Single sample ontology is created http://www.educause.edu/ pub/erferm04/erm O452.
for demonstration. asp?bhcp=l
169
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
170
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
171
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
fashioned rigid approach of the cultural heritage presentation Internet—a more mature, distinctive medium characterized by
and the lack of appropriate marketing strategies. user participation, openness, and network effects. [3]
Many museum activities are created not having any kind of Basically Web 2.0 refers to the transition from static HTML
market research or user survey, but based only on the web pages to a more dynamic, second generation of the World
curator’s idea. This also is the case with the museum exhibits, Wide Web, where people could collaborate and share
where the curators often have an abundance of objects which information online.
they want to present in the exhibit, but there is always the There have been many successful examples where the
constraint of space and money. In some way this can be implementation of the new techniques, have increased the
categorized as “telling the curator’s version of the story”, quality of work of the museums. The Bitola museum is one
which can be good or bad but never complete. such example, this kind of strategy, resulted with many
How visitors are experiencing the exhibits and can they benefits for the museum.
contribute in some way, are the factors that are many times
neglected.
The modern technologies had in great deal influenced the
IV. THE BITOLA MUSEUM WEBSITE
peoples life’s and also have introduced many new ways of
cultural heritage presentation and visitor collaboration. The old website of the Bitola museum existed since 1999
According to ICOM, “Museum is non-profit, permanent and it was static HTML website offering only one way
institution in the service of society and its development, open presentation of the museum.
to the public, which acquires, conserves, researches, In 2006 for the first time in Republic of Macedonia, the
communicates and exhibits the tangible and intangible “Virtual exhibits” were presented, offering new approach
heritage of humanity and its environment for the purposes of towards the presentation of the cultural heritage. The virtual
education, study and enjoyment”. [1] exhibits have proved themselves as a successful tool, resulting
Having this definition in mind, the museums must use all with increased number of “online” and “real” visits to the
the available means and technologies in order to be successful museum.
in all previously mentioned areas. With the information age, With the introduction of the new museum exhibit and the
many museums along with all other type of information have necessity of its adequate presentation, new strategy was
gradually moved from real into virtual space. developed, based on the proven virtual technologies,
Many critics have argued that museums need to move from supported by the use of Web 2.0. The new website of the
merely supplying information to providing usable knowledge Bitola museum was presented at the beginning 2010.
and tools that enable visitors to explore their own ideas and
reach their own conclusions [2]. This argument seems
especially relevant today, when technology gives individuals
access to communication, information gathering and analysis.
The evolution of the internet technologies and introduction
of Web 2.0, is opening a whole new realm of opportunities
towards the increased operational effectiveness of the
museums.
172
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
V. THE BITOLA MUSEUM ON FACEBOOK Soon after all the galleries and videos were transferred to
the facebook account, which made this account very popular
Being on the Internet is not just having a website. Almost and generated large circle of friends in a short time. This is
every company today has a Facebook profile or a Twitter also another advantage of the use of social media, creation of
account in order to stay in touch with its clients. With circle of friends with similar interests. The online friends are
estimated 1.2 billion users, the social media sites represent a not limited by the place and time barrier. For example city
significant tool for promotion of the companies, their products like Bitola has a very large scientific and nonscientific
and activities. community outside its borders, holding large quantity of
However, Web 2.0 is not only about social connections or knowledge and assets in different areas.
promotion. Constantly evolving, the Web 2.0 technologies Also trough the analysis of the comments, it was
provide new smart and interactive formats to show determined that in some areas of interest a large quantity
information. information was contained in the “normal” users also. Either
Social media is not just about opening up another marketing in form of historical fact they have witnessed, some person
channel. It enables customer participation on many levels. For they knew or a story they have heard.
museums, it offers various ways to support the museum
experience and even to extend it beyond the actual visit. It is
not about virtualizing the museum, but about developing new
models of participation and feedback [4]
With more than 830 million users Facebook is the most
used social media site, and it was the first choice for social
profile for the Bitola museum.
In Republic of Macedonia the number of facebook users in
March 2012 was 936 300, or 49,15 % of the total population
and 88,55 % of the internet users [5]. According to Social
Bakers, more than 50% of the facebook users are under the
age of 34, which is target group for many museums. It is
known fact that the younger population is spending less time
visiting the museums, so new approaches must be developed Fig. 5. Facebook profile of the Bitola museum
in order to popularize the cultural heritage.
Using the sport as always interesting topic, some photos
from the early days of the local soccer club “Pelister” were
published. The museum had those photos but with only small
legend describing their date and the clubs that played. Soon
after, some of the players or their close relatives and friends
were tagged, and in very short time the images were
completely described, involving all kind of information. Even
greater asset was the generated circle of friends tagged on the
photos, which can be used in future researches.
173
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
developed, which embraced the user interactivity with the - 92 % wanted to continue with workshops and to be
museum. In some way this created more “friendly” image of involved for the next year
the museum, resulting with more users donating images to the - All of the participants had facebook profile and more
museum. than 70 % have shared their museum activity on their
During the campaign “Bitola then and now”, more than profile
thousand old photos were collected by the museum from the - More than 70 % of schools asked for extra workshop
online friends. More than 70 % of these photos were new for on other subject (art, geography…)
the museum and as a result of this campaign temporary - More than 80 % of the participants have never been in
exhibition was organized in occasion of the day of liberation a museum before the workshops
of Bitola – 4th November. - More than 40 % of the participants, claimed that their
Trough the online communication the museum gathered a close relative or friend have visited the museum on
large quantity of new information and managed significantly their suggestion after the workshop.
to increase its inventory trough donations and acquisitions. After the workshop a meeting was held with the
The online friends have accepted with great pleasure this participants, where the mutual experience was shared. Many
new approach and many of them have contacted the museum of the participants said they liked the Web 2.0 activities
concerning different matters. Based on this communication a implemented by the museum and today some of them are also
large quantity of new ideas have evolved, which are among the most active participants and supporters. According
constantly implemented by the museum. According to many to them, “The Bitola museum represents an excellent place for
experts, the Bitola museum is the leader in the area of cultural heritage education and sometimes fun by participating
innovative approach in Republic of Macedonia in the online quizzes”.
The number of visitors is increased thanks to the different
types of educational and interactive programs for all
categories and excellence promotion in the media and
VII. CONCLUSION
International fairs.
It is evident that the new internet technologies have
changed the people’s everyday lives. If the museums want to
VI. EDUCATIONAL WORKSHOP : “MUSEUM be successful in their work, they are left with only two
DETECTIVE” choices: to resist the changes and have only minor individual
efforts in this area, or to embrace the new technologies and
The museum of Bitola has significant experience in the make the required organizational change. The benefits of the
organization of educational games and activities for the second approach are evident in many fields of the museum
younger audience. In 2011 new project was conducted, aimed work and significantly increase the quality of work in the
towards the education and familiarization of the museum by museums.
the young audience. Those educational workshops are part of
long-term project “Learning about us” REFERENCES
The main goal of the ”Museum detective“ was to provoke
the participants to be interactive using different types of [1] http://icom.museum, International Council of Museums.
techniques and gain knowledge about the cultural heritage [2] Lynda Kelly, Ph.D., “How WEB 2.0 Is Changing the Nature of
(during the “game”). Museum Work”,
Before the task all participants attended lectures according http://museumstudies.si.edu/webcast_052110.html.
to their age and the possibilities for further research were [3] John Musser, Tim O’Reilly & the O’Reilly Radar Team “Web
presented to them. They were divided in groups and every 2.0 - Principles and Best Practices”
group had received a task to locate specific object from the [4] Vogelsang, A. and B. Minder. “Audience+: A Holistic
museum exhibition. The museum collection of the Bitola Approach to Developing Social Media Guidelines for Swiss
Museums. In J. Trant and D. Bearman (eds).” Museums and the
museum is among the richest in Republic of Macedonia with
Web 2011: Proceedings. Toronto: Archives & Museum
abundance of objects. Having in mind the competition aspect Informatics. Published March 31, 2011.
of the game, it was determined later that the participants who [5] http://www.socialbakers.com
did pre-game online research, were more successful than their
competitors. A large number of participants were involved in
these workshops and even greater interest is recorded for the
second phase planned for May 2012.
This project resulted with some interesting conclusions, or
expressed trough statistics:
- In the following 4 months 35 % more primary and
secondary school visits were recorded in the museum,
than the same period in 2010
- 78 % of the participants have visited the museum
before the workshops to learn more
- 92 % have used the museum web site before the
workshops
174
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
175
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
selects which software he or she needs. SlapOS Master then operating system agnostic and to automate application
allocates the software onto a SlapOS Node and provides the configuration process in a reproducible way.
connection information to the user. The allocated software can
be of any type: virtual machine, database server, application
server, web cache front end, etc.
From a developer point of view, as seen in Fig. 2, SlapOS is
a simple and universal API to create instances of any software
daemon through a programmatic interface.
176
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
IV. CONCLUSION
SlapOS can be described as a cloud operating system in
which “everything is a process” unlike Unix in which
“everything is a file”. If one has to manage thousands of
servers with thousands of processes, hundred different
applications in multiple different releases or versions, SlapOS
can help you a lot by making the whole security management
process well specified, automated and under control.
Therefore cloud security is shared with the processes of the
applications running on the nodes.
The second result with SlapOS is that the best way to create
a reliable and secure cloud computing system is to follow the
original principles of the Internet: distribution and simplicity.
Our system can also help keeping track of exploit
development, optimize patching for zero-days threats and to
produce log auditing to improve security risk management.
As future work we envision an early warning system of
cloud attacks that applies intrusion prevention measures based
on sensor information from different partitions on the
distributed nodes.
ACKNOWLEDGEMENT
This paper is presented as part of the project “Valorificarea
capitalului uman din cercetare prin burse doctorale
(ValueDoc)” Project co-financed from the European Social
Fund through POSDRU, financing contract
POSDRU/107/1.5/S/76909 and part of the project “Cloud
Consulting”.
REFERENCES
[1] George Suciu, Octavian Fratu, Simona Halunga, Cristian
George Cernat, Vlad Andrei Poenaru, Victor Suciu, “Cloud
Consulting: ERP and Communication Application Integration in
Open Source Cloud Systems”, 19th Telecommunications Forum
- TELFOR 2011, IEEE Communications Society, pp. 578-581,
2011
[2] Heithem Abbes, Christophe C´erin, and Mohamed
Jemni.Bonjourgrid as a decentralised job scheduler. In APSCC
08.Proceedings of the 2008 IEEE Asia-Pacific Services
ComputingConference, pages 89–94, Washington, DC,
USA,2008. IEEE Computer Society.
[3] Memcached: a free and open source, high-performance,
distributed memory object caching system.
http://memcached.org/
[4] Buildout - software build system reloaded
http://www.buildout.org/
[5] Supervisor: A Process Control System http://supervisord.org/
[6] "The impact of virtualization on network performance of
Amazon EC2 data center", Tze Ng, Guohui Wang, IEEE
INFOCOM 2010 - 029th IEEE International Conference on
Computer Communications, Vol. 29, no. 01, March 2010
177
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
178
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
online and healthcare institutions lack a possibility to quickly Core messaging service also maintains the data about
notify such users of some important information if needed. patients’ subscriptions to our system and stores them in a
small database on the same server.
E. Broadcast possibilities Third role of core messaging service is to choose
appropriate interface for sending messages. As shown in
Fig.1. there are two possible interfaces – SMS gateway and
It is possible to quickly and easily transfer information to a
GSM modem.
large number of users through SMS (for example to all
SMS gateway is a service provided by a GSM service
patients registered in a healthcare institution database). In this
case SMS outperforms traditional phone calls. provider company. SMS gateway can be exposed as a web
application or a web service and depending on that our core
messaging service accesses it by using HTTP for web
III. IMPLEMENTATION application or SOAP for web service.
GSM modem is a specialized type of modem which accepts
Our system for automated sending and receiving of textual a Subscriber Identity Module (SIM card), and operates over a
messages operates as a “middle layer” between existing subscription to a mobile operator, just like a mobile phone.
Medis.NET information system and patients (Fig. 1.). From the mobile operator perspective, a GSM modem
Left part of the diagram shows existing Medis.NET behaves just like a mobile phone. From our perspective GSM
information system. Medis.NET manages patient’s Electronic modem compared to standard mobile phone has some
Health Records (EHR), patient’s visits scheduling, work advantages (can be connected at the same time both to
scheduling for employees, maintains financial data regarding external power supply and to our server by a cable
provided services etc. All the data is kept in a central database connection).
and can be accessed by the employees of healthcare institution Provided with these two interfaces, our core messaging
through Medis.NET client application. service can make a choice which one to use based on
Central part of the diagram shows our system for automated configuration parameters. Usual configuration settings are
sending and receiving of textual messages. Core logic of our such that SMS gateway is used with a higher priority because
system is running as a service on application server node. This of its lower price per message and higher throughput. GSM
service listens to existing Medis.NET database for data modem is used only as a back-up interface in case of failure of
modifications. If an important data for a patient who is the SMS gateway.
subscribed to this service is modified then the service sends
appropriate text message to the patient (e.g. some biochemical
laboratory analysis for the patient are finished and service
IV. A TYPICAL USE CASE SCENARIO
sends some most important results in the message also
reminding him/her to collect full list of results at the In this chapter one interesting usage of our system for
automated sending and receiving of textual messages will be
healthcare institution).
described. We use it here to improve an existing system for
patients’ visits appointments.
179
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
the institution the patient can use our SMS service as shown
on Fig. 2.
1. Patient registers for our service by sending an SMS
containing service keyword and his Social Security
Number.
2. SMS gateway forwards the message to core
messaging service.
3. Core messaging service checks appointments and
position in waiting queue for this patient.
4. Core messaging service estimates time when the
patient will be examined and stores his registration in
messaging database.
5. Core messaging service creates a confirmation
message containing estimated time when patient’s visit
should start and information that he will receive one more
message 30 minutes before that.
6. SMS gateway forwards confirmation message to the
patient.
7. Doctor at healthcare institution examines patients
and removes examined patients from the waiting queue
using Medis.NET information system (Fig. 3.).
Medis.NET information system already has a sophisticated Fig. 3. Medis.NET application used by medical personnel shows
module for scheduling employees work time and appointing lists of scheduled patients, patients in the waiting room and
patient’s visits [4]. This system supports automatic generating examined patients
of work time schedule for employees and splits generated
work time into time slots for patients. Duration of time slot is
configurable, based on employee’s specialization and work 8. Modifications from Medis.NET client are transferred
area (e.g. 15 minutes for general practice medicine, 20 to Medis.NET database.
minutes for dentistry etc.). For most specializations and work 9. Core messaging service detects modifications in
Medis.NET database.
areas this approach works fine but there still some
10. Based on new data in the waiting queue, core
departments which make appointments for their patients on
daily bases and not for precise hour and minute. Also for messaging service makes new estimation of the waiting
some work areas time needed per patient can significantly time.
vary, for example from 15 to 30 minutes. 11. If new estimation of the waiting time is about 30
In such cases our system for automated sending and minutes core messaging service sends invitation message
which contains new estimation for examination start time.
receiving of textual messages can enable patients to quickly
check their appointment status, get estimation when they will 12. SMS gateway forwards invitation message to the
be examined and/or get an invitation message 30 minutes patient (Fig. 4.).
before they should come to doctor’s office.
Take for example a patient who already knows that he has
an appointment today, but healthcare institution can’t provide
him exact time of his visit. Instead of waiting several hours at
180
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
REFERENCES
[1] G. Le Bodic, Mobile Messaging Technologies and Services:
SMS, EMS & MMS, Chichester, West Sussex, England, John
Wiley & Sons Ltd, 2005.
[2] P. Rajković, D. Janković, V. Tošić, “A Software Solution for
Ambulatory Healthcare Facilities in the Republic of Serbia",
Healthcom 2009, Conference Proceedings, pp.161-168, Sydney,
Australia, 2009.
[3] P. Vrgović, I. Jošanov-Vrgović, B. Jošanov, “SMS Information
Service: Innovative Thinking for the Successful Solution”,
Management Information Systems, vol. 6, no. 3, pp. 22-28,
2011.
[4] I. Marković, S. Cvetković, D. Janković, “An Implementation of
a Scheduling Tool in a Medical Information System”, ICEST
2010, Conference Proceedings, pp.327-330, Ohrid, Macedonia,
2010.
Fig. 4. Invitation message received on patient’s phone [5] A. Stone, "Mobile scaffolding: an experiment in using SMS text
messaging to support first year university students", ICALT
2004, IEEE International Conference on Advanced Learning
Technologies Proceedings, Joensuu, Finland, 2004.
V. CONCLUSION [6] A. Dickinger, P. Haghirian, J. Murphy, A. Scharl, "An
investigation and conceptual model of SMS marketing",
HICSS-37, Proceedings of the 37th Annual Hawaii International
In this paper we presented our implementation of a system Conference on System Sciences, Hawaii, 2004.
for automated sending and receiving of textual messages. [7] L. Prabhakaran, W. Yan Chee, K. Chong Chua, J.
Motivated by existing systems in different areas such as e- Abisheganaden, W. Mun Wong, "The use of text messaging to
learning, e-banking, marketing etc. ([5], [6], [7]) we designed improve asthma control: a pilot study using the mobile phone
our system as an improvement of a medical information short messaging service (SMS)", Journal of Telemedicine and
system. Telecare, vol. 16 no. 5, pp. 286-290, 2010.
Use case presented here is planned to assist medical
personnel in scheduling patients’ visits and to reduce waiting
time for the patients. Our plans for future work include some
more services for patients based on the system for automated
sending and receiving of textual messages. One possible
extension is related to biochemical laboratory. When some
analyses for the patient are finished the service would send
most important results in the short message also reminding
patient to collect full list of results at the healthcare institution.
It is also possible to create a notification service which would
warn a patient that a period of time has expired since his/her
last visit to a doctor (for example 6 months after visiting
dentist) and remind patient to consider scheduling a new visit.
Another possibility is to create a service which would
broadcast warning messages about changes in weather
conditions to all registered patients with chronicle diseases
which could be affected.
Although we listed plans for extending our messaging
service in healthcare area, it is important to notice that the
service is not limited to this area and that it could easily be
coupled with other kinds of information systems.
181
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
I. INTRODUCTION A. AR browsers
Augmented Reality (AR) is defined as a real-time direct or This group includes AR browsers (ARBs), that are,
indirect view of a physical real-world environment that has applications of augmented reality aimed at helping the search
been enhanced by adding virtual computer-generated of the real environment by using mobile devices cameras. By
information to it [1]. Improvements in computer following the search of the images of the real environment,
graphics technology have lead to the world of virtual they are augmented with multimedia contents (html, image,
reality becoming more and more real, while the audio, video or 3D models). AR browsers index the content
possibilities of combinations with real (actual) worldly through media streams (termed channels, layers, or worlds).
environment opens a new dimension in the understanding of ARBs, generally, accesses remote resources using web
the concept of reality (the real world). In cases where the protocols and web services.
combination of real space and virtual elements is needed, the All ARBs work in a similar way and consist of the
practical application indicates that there are no fixed limits. following components (Fig. 2.):
According to Milgram [2], the possible combination states 1. The ARB represents the client on the mobile device.
are shown in Fig. 1. Through the implementation of virtual 2. The publishing website - a website on which developers
objects into a real environment we create the augmented can register new channels (layers, worlds), and manage their
reality. channels and accounts.
3. The ARB server is the basis of this system and represents
the interface towards other components (ARB, the publishing
web site, and external servers).
4. The external server – a platform on which are stored all
the multimedia contents (images, text, audio, and video) as
well as the description of the location (POI - point of interest).
Fig. 1. Milgram’s reality-virtuality continuum [2].
182
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
On the basis of previous research [4], shown in Fig. 3., we formed in the case of the Layar browser. It supports 2D multi-
carried out an analysis, of the three most frequent AR media contents. This browser uses its own ARML language
browsers from the first group: Layar, Junaio, and Wikitude. (Augmented Reality Markup Language) which is based on
KML (Google) and enables the addition of more data onto the
POI including addresses, telephone-numbers, links, different
icons and images. Using the ARML database we can
exchange data between the client (the mobile device), the
Wikitude server, and external servers. This ARB can be used
on iOS and Android platforms.
183
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
Qualcomm [9] has developed a platform for augmented Taking into consideration the characteristics of the
reality known as Vuforia. Vuforia SDK supports the Android described software systems, we have opted for the Junaio AR
and iOS platforms. It uses natural-feature tracking and frame browser. Using this AR browser we have designed an
markers. In addition to these characteristics, Vuforia also application for the archaeological site Medijana. The
supports the option of virtual buttons, which registers the application was designed so that when the visitor, while
contact between the user and the marked parts of the marker. touring the archaeological site, using the camera on the
The tracking of objects which are rectangular in shape or mobile device, detects a mosaic, the screen of the device
something with a similar shape is also made possible. For the shows a 3D model of the Roman fountain in the exact location
purpose of tracking the Vuforia SDK via one’s Target where it was once located (Fig. 6.).
management system, a dataset configuration XML file is In order to realize the application, we used tracking: NFT
created. The Vuforia uses OpenGL ES for rendering 3D (natural feature tracking), that is, vision based markerless
objects. The Vuforia has an AR extension for Unity that tracking. In our case the tracking object is the image of the
enables vision detection and tracking functionality. mosaic.
The AR view content represents a 3D model of the
fountain. The model of the fountain is given in the *.obj
which is encrypted with the help of the online Junaio Model
Encrypter. These AR content is stored on the external server.
The structure of the application follows the one given in
Fig. 2. On the external server we generated a program code
(php) which is used to connect with the Junaio server. This
code enables the execution of other processes: the
authentication process, the selection of multi-media contents
as well as the transfer of the necessary parameters (XML).
The creation of channels is provided through the user
Fig. 5. System overview of Vuforia SDK [9].
interface on the Junaio server. We selected the Junaio GLUE
channel. When forming the channel, we defined the other
III. EVALUATION AND IMPLEMENTATION necessary data: the URL of the external server, the link for the
homepage, and refresh time to search the request to the
A. Evaluation external server. It is possible to define the channel for it to be
After experimenting in practice with the software briefly either of the type public or private. For additional searches of
discussed above, a comparative analysis of AR browsers and the channel the necessary tags are defined.
AR software development kits can be summarized as in Table This application is experimentally verified on the tablet
I. The most important elements of the software are shown: Asus transformer with the Android Honeycomb platform.
Platform – the system platform on which the described
software is implemented. Tracking – The type of tracking
which can be supported by the given software. Vision based –
tracking which is based on the natural features (NFT) or
classical (fiducial) markers [10]. Location based – this type of
tracking is realized with the help of the GPS sensor and
compass which are the constituent parts of a mobile device.
AR view content – the type of multi-media contents used to
augment reality. 2D means classic multimedia contents (html,
image, audio, video) while the 3D refers to the possibility of
displaying 3D objects. 3Dani marks the possibility of
displaying 3D animations.
We can conclude that the Layar and Junaio, judging by the
given elements, are very similar. They can be implemented on
the same platforms and support the same type of tracking
except that Junaio supports location based tracking in the
closed space where GPS is not available. From Table 1 we Fig. 6. Application example.
can note that Wikitude supports only location based tracking Augmented Reality is one of the upcoming technologies the
and only has the possibility of 2D contents. usage of which becomes simpler thanks to the development of
In the case of AR software development kits Metaio and mobile devices. The described application realizes a new
Vuforia, they support the same platforms. We can note a quality of the presentation of museum exhibitions. By using
difference can only be found in the case of the location based augmented reality technology is it possible to perform the
tracking which, for now, is not supported by Vuforia AR restructuring of the archaelogical sites and objects which do
SDK. not exist and whose reconstruction is complex.
184
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
TABLE I
A COMPARATIVE ANALYSIS OF MOBILE AUGMENTED REALITY SOFTWARE
AR browsers
platform tracking AR view content
name vision based location based
marker marker 2D 3D 3D ani
outdoor indoor
based less
Layar
Junaio
Wikitude
Vuforia AR SDK
In this paper we carried out an analysis and a comparison of [1] J. Carmigniani, B. Furht, M. Anisetti, P. Ceravolo, E. Damiani,
mobile augmented reality software. An application was and M. Ivkovic, Augmented reality technologies, systems and
designed for the virtual projection of the fountain in the applications, in: Multimedia Tools and Applications, pp. 341-
auditorium of the emperor’s palace at the archaeological site 377, 2011.
of Medijana. We have shown one of the possible ways for [2] P. Milgram, H. Takemura, A. Utsumi, and F. Kishino,
displaying cultural and historical heritage at the Augmented reality: A class of displays on the reality-virtuality
archaeological sites. continuum, Telemanipulator and Telepresence Technologie,
By using these applications, the desire and interest for the vol. 2351, pp. 282–292, 1994.
acquisition of new knowledge regarding cultural heritage or [3] R. Azuma, A Survey of Augmented Reality, In Presence:
history can be increased. Learning is made more complete and Teleoperators and Virtual Environments, vol. 6, pp. 355–385,
extensive at the very location, enhancing the learning process. 1997.
In order to use this technology it is necessary to perform the [4] Augmented Reality Browser Survey, Jens Grubert, Tobias
digitalization of cultural heritage, which contributes to its Langlotz, Raphael Grasset, Institute for Computer Graphics
preservation. and Vision Graz University of Technology, Austria , 2011.
This type of systems offers the visitor the possibilty of
selecting his own choice of additional contents regarding the [5] Layar, http://www.layar.com/browser/, Mar. 2012.
object being viewed, in accordance with the available time [6] Junaio, http://www.junaio.com/develop, Mar.2012.
and his personal interests.
[7] Wikitude, http://www.wikitude.com/developer/wikitude-
Further research on this topic should be focused on the use augmented-reality-for-developers, Mar. 2012.
of more inclusive software from the AR software
development kit group for the realization of multi-media [8] Metaio Mobile SDK, http://www.metaio.com/software/, Mar.
guides based on AR technology which could replace standard 2012.
audio guides. [9] Vuforia AR SDK, https://ar.qualcomm.at/qdevnet/, Mar. 2012.
[10] Michael Gervautz, and Dieter Schmalstieg, Anywhere
ACKNOWLEDGMENT Interfaces Using Handheld Augmented Reality, Computer,
Feb. 2012.
The work presented here was supported by the Serbian
Ministry of Education and Science (project III 044006).
185
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
1
Ana Stankovic is with the Faculty of Information Technologies at
II. CONCEPT OF AN INTELLIGENT AGENT
Metropolitan University, Tadeusa Koscusca 63, 11000 Belgrade,
Serbia, E-mail: ana.stankovic@metropolitan.ac.rs It has already been pointed out that there is no universally
2 accepted definition of the term agent. Debates concerning this
Dragan Stankovic is with the Faculty of Technical Sciences,
University of Pristina, Kneza Milosa No. 7, Kosovska Mitrovica, issue are still under way. In fact, while there is a general
Serbia, E-mail: sfsgagi@gmail.com consensus that autonomy is something that is always
3
Dusan Tatic is with the Faculty of Electronic Engineering, associated with agents, not all the details have been cleared
University of Nis, Aleksandra Medvedeva 14, 18000 Nis, Serbia, E- up. Perhaps the main reason for which one universally
mail: dusan@dragongroup.org
186
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
accepted definition is difficult to find lies in the fact that intelligent assistants, e-trade, production and modeling of
agents are used for finding solutions to problems within business processes [7], [8].
various domains. Therefore, for some applications, the ability
of agents to learn on the basis of their previous experience is
very important. However, for some other applications learning
III. DYNAMIC PROGRAMMING LANGUAGES
is not only unnecessary but also undesirable at times (an
example supporting these facts is found in the air-traffic In the last few years, the development of Web 2.0
control system; the passengers would probably not like the applications has brought about the increase of interest in
situation in which the system modified flights schedule at run dynamically typed programming languages. Great number of
time on the basis of previously learned facts). frameworks that enable efficient development of web
Agents can be regarded as an approach to structuring and applications and promote Agile application development
development of software that offers certain advantages and methodology have been developed. Terms such as DRY
that is suitable for certain types of applications (some papers (don’t repeat yourself), KISS (keep it simple but not simpler)
see agents as evolutionary in relation to objects) [5]. Agents’ and convention over configuration have been adopted by the
characteristics to reduce the interdependence of application programmers and these stand for the major directions the
components can represent their most advantageous programmers follow in the process of application
characteristics. Agents are autonomous, which can be development. Growing interest in programming languages
regarded as some kind of encapsulation [5]. While objects that increase productivity of web developers has resulted in
have their own methods that are controlled by external further expansion of their use in the desktop applications
entities, agents do not allow external entities to control them. domain making languages such as Ruby, Python and Groovy
When an agent gets a message, being autonomous, it decides extremely popular nowadays. What follows is a short
what is to be done with that message by itself. description of these programming languages and their
Interdependence of application components is reduced not important features that improve efficiency of rapid
only by the agents’ autonomy, but also by their robustness, prototyping of multi-agent systems algorithms.
reactivity and proactiveness. For example, when an agent
enters goal-directed phase, agent itself is responsible for the A. Ruby
process of realization of that goal. It is not necessary to
perform constant supervision and checking. Analogously, Ruby is a dynamic programming language which is
object can be regarded as a reliable employee that has no characterized by a complex but very expressive grammar and
initiative or sense of responsibility; supervision of that a good core class library with a rich and powerful API. Ruby
employee requires increased level of communication. On the is based on elements of Lisp, Smalltalk and Perl, but its
other hand, agent can be regarded as an employee that takes grammar is such that C and Java Programmers find it easier to
initiative and has the sense of responsibility. Therefore, learn. Ruby is a programming language that is completely
supervision of that employee does not require increased level object-oriented, but it is also suitable for procedural and
of communication, which is why it can be stated that there functional programming styles . Ruby includes powerful
exists lower level of interdependence. metaprogramming mechanisms and can be used for the
Reduced interdependence leads towards software systems creation of new languages which are suitable for certain
that are more modular, more decentralized and more easily domains or for the creation of DSLs (Domain Specific
changeable. This resulted in the fact that agents started being Languages). [9]
used in wide specter of applications, especially in applications
that are regarded as open systems, that is, applications which
B. Python
have been designed and written by different authors without
their mutual communication. Of course, this entails the
Python is a dynamic, object-oriented programming
introduction of certain standards. Examples of these systems
language which can be used for various forms of software
include semantic web and grid computing.
development. It offers strong support for integration with
The fact that some agents are proactive and reactive makes
other languages and tools, huge range of standard libraries and
their mode of problem solving similar to human. That feature
can be learned in a few days. Many programmers who had
resulted in a great number of applications in which agents are
had experience with Python programming reported substantial
used as substitutes for humans within some limited domains.
productivity gains and easier and more maintainable code
One such example is an application in which software agents
development. [10]
are used to replace human pilots in military simulations [6].
Another example are computer games. The game Black &
White uses agents that are based on BDI (Belief-Desire- C. Groovy
Intention) model. Another field within which agents have
been practically applied is the film industry. Producers of the Groovy is a developing dynamically typed programming
film Lord of the Rings used the software package Massive to language for the Java Virtual Machine. It builds upon the
generate armies of orcs, elves and humans. Each individual strength of Java but it also possesses additional features that
character was modeled as an agent. Other types of are inspired by languages such as Python, Ruby and
applications where agents show their advantages include Smalltalk. It supports DSLs and test driven development. Its
187
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
main advantage lies in the fact that it smoothly integrates with solution will be considered here, in which each node performs
Java objects and libraries. In fact, “Groovy is Java and Java is a local computation with insight only into the state of
Groovy”. Groovy is the second referent language for Java neighboring nodes. The principle of optimality underlies the
platform (Java programming language being the first), which solutions that will be illustrated: “if node x belongs to the
further explains its relation with Java [11]. shortest path from s to t, then the part of the path from s to x
(or from x to t) must also be the shortest path between s and x
D. Support for DSL creation (that is, x and t). This principle enables an incremental divide-
and-conquer procedure, also known as dynamic programming.
Let h*(i) represent the shortest distance from any node i to
Common feature of all languages that have been described
the goal node t. In that case, the shortest distance from i to t
so far is that they can create DSLs, that is, new programming
languages that enable more efficient development of via node j neighboring i is shown as: f*(i, j) = w(i, j) + h*(j),
applications for specific domains. This feature is important and h*(i)=minj f*(i,j). Having these facts in focus,
ASYNCHDP algorithm has each node perform the procedure
because it enables, for example, the creation of a specific DSL
shown in Fig. 1. Within this procedure, each node i maintains
for the domain of multi-agent systems, which, in turn, enables
a variable h(i) that stands for an estimate of h*(i).
more efficient modeling and development of multi-agent
It can be proved that ASYNCHDP procedure always
applications without losing the interoperability of the code
written in that new DSL with standard libraries. converges to the true values, that is, that h will converge to h*.
In this case, convergence will require additional step for each
node in the shortest path, which means that in the worst case
IV. DISTRIBUTED PATH FINDING PROBLEM convergence will require n iterations. However, this is not so
good for realistic problems. Not only will convergence be
Majority of problems that occur within multi-agent systems slow, but this procedure also assumes the existence of agent
are focused on how to meet some global constraints in a for each node. In typical search spaces it is not possible to
distributed way, that is, how the agents can optimize some enumerate all nodes in an efficient way and allocate each of
objective function in a distributed manner. In most cases, it is them a separate process. (For example, chess has
achieved with the help of four families of techniques and approximately 10120 positions). For that reason, programmers
specific problems. Those techniques are:
- Distributed dynamic programming (applied here to the procedure ASYNCHDP (node i)
path planning problem)
- Distributed solutions for Markov Decision Problems if i is a goal node then
(MDP – Markov Decision Problems) h(i) 0
- Algorithms of optimization algorithms of economic
else
functions (matching and scheduling problems)
- Coordination on the basis of social laws and conventions initialize h(i) arbitrarily (e.g. to or 0)
(example of traffic regulations) repeat {
With the purpose of illustration, distributed dynamic
programming will be applied to the path planning problem. forall neighbors j do
Path planning problem consists of a weighted directed graph f(j) w(i, j) + h(j)
with a set of n nodes N, directed links L, a weight function w:
h(i) minj f(j)
LR+ and two nodes s, t N. The goal is to find a directed
path from s to t that will have minimal possible total weight. }
Generally speaking, a set of goal nodes TN can be
considered, and the shortest path from s to any of the goal
Fig. 1. Asynchronous dynamic programming algorithm
nodes tT can be looked for.
This kind of abstract framework can be applied in various often turn to heuristic versions of the procedure that require
domains. It can certainly be applied in cases of some specific smaller number of agents.
networks (for example, transportation or telecommunication
network). Nevertheless, it can be applied to other problems as
well. For example, in a planning problem the nodes can be VI. RESULTS
states of the world and the arcs can be the actions that the
agent performs. In that case, the weights stand for the cost of We have implemented the above mentioned algorithm in
each action (for example, the time needed for the action) (37) Java, Groovy, Python, and Ruby and used the number of lines
(38). of code as a measure for evaluating their rapid prototyping
abilities. It can be further discussed whether the number of
lines of code is a measure that can be suitable for the estimate
V. ASYNCHRONOUS DYNAMIC PROGRAMMING of efficiency of some programming language in a specific
domain (multi-agent systems). The lines of code will depend
The problem of finding the best path is the problem that has on developer’s experience with certain programming language
been thoroughly studied in computer science. Distributed and the applied code style rules. The code that we used here
188
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
and the way it was generated are sufficient for the process of REFERENCES
drawing general conclusions. One such conclusion is that
there is a big difference between statically typed Java and [1] F. Ortin, “Type Inference to Optimize a Hybrid Statically and
dynamically typed languages that were considered here. The Dynamically Typed Language”, The Computer Journal, vol. 54,
graph shown in Fig. 2 illustrates this difference in the best No. 11, 2011
possible way. [2] S. Russell, P. Norvig, “Artificial Intelligence - A Modern
Approach”, Prentice Hall, 2009.
[3] M. Wooldridge, “An Introduction to MultiAgent Systems”,
Chichester : John Wiley & Sons, 2002.
[4] M. Wooldridge, N. Jennings, “Intelligent Agents: Theory and
Practice”, Knowledge Engineering Review, 10(2): pp. 115–152,
300 1995.
[5] M. Wooldridge, “Intelligent Agents. In: G. Weiss (Ed.),
196 Multiagent Systems. A Modern Approach to Distributed
200 Artificial Intelligence”, The MIT Press, Cambridge,
Massachusetts, pp. 27-78, 1999
84 88 [6] G. Tidhar, C. Heinze, M. Selvestrel, “Flying together: modelling
78
100 air mission teams”, Applied Intelligence. 1998, Vol. 8, 3, pp.
195–218.
[7] W. Shen, D. Norrie, “Agent-based systems for intelligent
0 manufacturing: a state-of-the-art survey”, Knowledge and
Information Systems, An International Journal. 1999, Vol. 1, 2,
Java Groovy Python Ruby pp. 129–156.
[8] N. Jennings et al., “Autonomous agents for business process
LoC test application
Fig. 2. Lines of code (LoC) for the complete
management”, International Journal of Applied Artificial
Intelligence. 2000, Vol. 14, 2, pp. 145–189.
that relies on AsynchDp algorithm for different programming
[9] D. Flanagan, Y. Matsumoto, “The Ruby Programming
languages
Language”, O'Reilly Media, 2008.
[10] [Online] http://www.python.org/
[11] [Online] http://groovy.codehaus.org/
VII. CONCLUSION
ACKNOWLEDGEMENT
189
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
1
Dušan B. Gajić and Radomir S. Stanković are with the University Example 1 The group character tables, for the cyclic
of Niš, Faculty of Electronic Engineering, Aleksandra Medvedeva groups Cp of orders p = 2, 3, and 4, are given in Table I, where
14, 18000 Niš, Serbia, E-mails: dule.gajic@gmail.com,
i = −1 , e1 = −0.5 ⋅ (1 − i 3) = exp(2π i / 3) , and e2 = e1∗ =
radomir.stankovic@gmail.com.
−0.5 ⋅ (1 + i 3) = exp(4π i / 3) .
190
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
191
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
Indices of memory locations for the rest of the elements 1. Host program, which executes on the CPU and creates
( cx , y ⋅ ai , j , x, y, i, j = 0, 1, 2, except for the case i = j = 0) in a and controls the context for the execution of kernels as
computed block are determined as: well as allocates and transfers data to the GPU
memory.
nextElement ← startElement + i ⋅ 32 + j . (7) 2. Device program, which is processed on the GPU and
The results of the computations are stored in the GPU implements the SPMD kernels.
global memory which has a linear layout. Formulas for the In the presented OpenCL implementation, the host program
computation of the memory location indices ((6) and (7)) lead determines the character table for the cyclic subgroup Cp
to the GPU global memory access pattern which is, for through (1). Notice that not all of the characters of Cp need to
Example 2, depicted in Fig. 2. Coloring of the blocks and the be computed by using (1), since, e.g., e p −i = ei ∗ , for i = 1, 2,
memory locations in this figure corresponds to the thread
coloring in Fig. 1. …, p / 2 − 1 . Thus, we compute half of the rows of the
character table for Cp, while other rows are determined by
using this property.
The host allocates GPU global memory space for two (pm ×
m
p ) matrices that are used as buffers to store the results of the
application of the Kronecker product. This minimizes the
communication between the host and the device, which is a
bottleneck in the GPU computing [8, 12, 13]. Note that we
have to reserve the space for (pm × pm) matrices at the
beginning of the computation, since the size of the GPU
buffers cannot be changed after their creation, otherwise, we
would have to create buffers and transfer data between the
host and the device for each step of the algorithm, as the
Figure 2. GPU global memory access pattern for Example 2. resulting intermediate matrices increase in size. To minimize
the memory bandwidth occupation on the GPU itself, we use
In the general case, in the kth step of the algorithm, we the technique of buffer swapping [7]. For odd-numbered
perform the Kronecker product of a (pk × pk) matrix by the steps, the first matrix is used as the input to the kernel and the
(p × p) matrix, and the result is a (pk+1 × pk+1) matrix. second matrix as the output. For even-numbered steps, the
Therefore, there are p2 active threads in the first step of the order is reversed.
algorithm, while in the kth step, there are p2k active threads. The character table for Cp is stored in a (p × p) matrix and it
The index of the GPU memory location for the first entry is used as the second operand in the Kronecker product
( cx , y ⋅ a0,0 ) of the block is determined as: operation in each step. Since it is of a small size, we keep it in
the constant GPU memory, which is cached. This allows
startElement ← x ⋅ p k + 2 + y ⋅ p, (8) much faster access and leads to improved program
The indices of the memory locations for the other elements performance [12].
( cx , y ⋅ ai , j , i, j = 0, 1,…, p-1, except for the case i = j = 0)) in a The Algorithm 1 presents a pseudo-code for the device
program. Code in lines 2 and 6 implements (8) and (9),
block are:
respectively. Since the characters of finite Abelian groups are
nextElement ← startElement + i ⋅ p k +1 + j ⋅ p . (9) complex numbers, elements of C pk , C p , and C pk +1 are
C. Features of the Mapping stored in the GPU buffers using the float2 OpenCL vector
data type [10]. The first component in the vector variable
The proposed method for computing the character tables stores the real part and the second component the imaginary
has the following features: part of the complex number.
1. The character table is stored as a vector of length p2m
obtained by the concatenation of rows of [ C pm ]. This Algorithm 1 Pseudo-code for the device program
allows reading the values of characters directly without 1: x, y ← acquire thread indices in the two-dimensional grid
any reordering. 2: startElement ← x · pk+2 + y · p
3: adr1 ← x · pk + y
2. Elements of [ C pm ] computed by threads with the same 4: for i = 0 to p-1 do
first index and the successive second index are stored 5: for j = 0 to p-1 do
in neighboring memory locations. This automatically 6: nextElement ← startElement + i · pk+1 + j
allows memory coalescing, due to which multiple data 7: adr2 ← i · p + j
k +1
accesses to the GPU global memory are performed as a 8:
C p (nextElement).re ← C p (adr1).re · C p (adr2).re –
k
192
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
193
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
194
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
Widely known success stories behind the RISC architecture III. VLIW AND EPIC ARCHITECTURES
are AMD 29K, ARM, SPARC, Power/PC, and MIPS. ARM
takes the lead in embedded systems, such as smart phones and
tablet computers, due to its low cost and low power A. Very Long Instruction Word
consumption.
Unlike the Superscalar architecture, which relies on
hardware to detect and overcome data dependencies, Very
C. Instruction Level Parallelism Long Instruction Word (VLIW) processors, [3] use software
solutions (compilers) to mark independent instructions.
Further research led to an idea, which explains that splitting Usually compilers translate the code into intermediate
the work of a single processor to multiple processors will language, optionally optimize it, and as well generate machine
increase the productivity and will speed up the execution of code for the specific architecture, [6]. VLIW processors use
the instructions. The main setback here is that programs were compilers that inspect the source code and thus concentrate on
written and were meant to be executed in sequential manner, scheduling and optimizing the raw source code before
that is, one instruction at a cycle. This restriction of the translating it.
sequential execution came from the data dependencies Scheduling is done using two structures: control flow and
between the variables in a program. data flow graphs, [6]. Control flow graphs divide the source
Pipelining is a mechanism which enables instruction level code into basic blocks that must be sequentially executed
parallelism, since parallel instructions are executed in parallel (usually the delimiter is a branch or a label), [6]. The data
over multiple cycles. The theoretical increase of the flow graph shows the dependencies between registers within a
instruction execution speed is proportional to the pipeline basic block and those which are independent can be executed
length, [2]. However, there are three potential hazard in parallel, [6]. Here, the disadvantage is that a single basic
problems that can occur, during the pipeline execution of block usually contains four to six operations and therefore,
parallel instructions. Data hazards appear when an instruction limits the amount of parallelism that can be achieved. To
result depends on the previous instruction; structural hazards maximize parallelism, a technique called global scheduling is
happen when there is not enough hardware space for the used, where instructions are moved from one block to another,
parallel instructions execution and control hazards are result [6].
of the unexpected program counter change, [1]. There are Transmeta’s Crusoe ® and Texas Instruments 320C6x line
several mechanisms targeting these problems, and the of processors are the commercial breakthrough behind the
simplest solution is to stall the pipeline. VLIW architecture. Transmeta’s Crusoe processor uses hybrid
hardware-software implementation of the VLIW architecture.
D. Superscalar architecture It is a 128 bit architecture that uses Code Morphing Software
that detects and resolves data dependencies. The Code
RISC architecture is very suitable for exploiting parallelism Morphing software also implements routines for power
through pipelining, since all the RISC instructions are simple management and thermal dissipation, which makes this
and take roughly the same time to finish. The instruction processor ideal for mobile devices. The Texas Instruments
execute stage is usually the most time consuming pipeline 320C6x line of processors is a general purpose DSP processor
operation, so if the processor architecture employs multiple using the VLIW architecture, which is mainly used as a
execution units, it would always have a busy one, while the research processor. It has wide range of debugging tools and
others would be idle, [2]. As a solution to this problem, compilers available for research.
computer architects proposed a superscalar architecture,
characterized with parallel instructions execution on multiple B. Explicitly Parallel Instruction Computing
executing units. Although this architecture utilizes more
execution units simultaneously, the number of hazards is The explicitly parallel architecture was designed to
increased and the processor has to retire the instructions in overcome some essential limitations of the VLIW
program order if they are re-ordered (dynamic scheduling). architecture, such as hardware dependence. The EPIC
Besides that, handling branch operations becomes very architecture solves the hardware dependence problem, by
problematic, since a typical program executes a branch after defining several mini-instructions which can be combined in
each six or seven instructions. A possible solution would be to groups, depending on the template type field, [8]. Therefore,
utilize a special hardware branch predictor, which would the processors which are characterized with greater
predict the target with some probability, on behalf of the parallelism capabilities will simply exploit more bundles in
previous branch results. However, this approach has still some parallel. EPIC processors utilize dispersal technique to issue
disadvantages, such as speculatively wrong executed two bundles at a time, and split-issue mechanism if the mini-
instructions. The processor architects overcome this difficulty, instruction cannot be executed. Furthermore, the instructions
by extending the processor architecture with reorder buffer. can be predicted, reducing the cost of a branch operation.
This buffer is intended to store the results of speculatively However, the cost for wrong prediction is very high, because
executed instructions, and to update the real state after the branches appear very often. EPIC processors provide
correct instructions has completed, [1]. hardware support for the control speculation of loads and they
allow parallel issuing of multiple prioritized branch
195
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
operations. Speculative load failures are resolved with poison IV. DATAFLOW ARCHITECTURES
bits utilization, [1], [2].
The EPIC architecture doesn’t solve all the problems of the Concurrency is a major step in increasing computational
VLIW architecture. The difficulty with the increased code size performance, especially with today’s technological
(because of the empty slots in the bundles) still remains limitations. Dataflow architecture offers an attractive
unsolved. This has a negative impact on cache performance alternative to the conventional control flow architecture in
and bus bandwidth utilization. Other very important feature of providing concurrency in execution of programs. Execution of
each EPIC processor is the good compiler support, [1]. each dataflow instruction depends only on the availability of
This architecture has only one implementation, as part of its operands, which implies implicit synchronization of
the IA-64 processor architecture of Itanium family processors, parallel activities. There are no constraints in sequencing of
[1]. Intel Itanium architecture processors have been designed dataflow instructions, except for the conventional data
from the ground up to meet the increasing demands for high dependencies in a program.
availability, scalability and performance needed for high-end Data flow architecture differs from control-flow
enterprise and technical computing applications. In its core, architecture, by two basic principles: asynchronous operations
Itanium was designed to address a number of performance and functionality. Dataflow instructions are executed only
bottlenecks in computers, such as memory latency, control when all input operands are available (assuming hardware
flow dependencies and memory address disambiguation. It resources are also available), in contrast to control-flow model
enables the hardware to take advantage of the available which uses program counter for sequential ordering of
Instruction Level Parallelism and to provide the necessary instruction execution. The functionality rule implies that any
resources, while focusing on dynamic runtime optimizations. two enabled instructions can be executed in either order or
Precision Architecture – Reduced Instruction Set Computer concurrently, only if they don’t interfere with each other
(PA-RISC) [7] was originally designed as a 32-bit (don’t have data dependences), which implies parallel
architecture, intended to be easily scalable across a broad processing.
performance range, while providing for straightforward A dataflow program is represented as a directed graph,
migration of applications from existing systems. It was rather where named nodes represent instructions and links
conservative RISC design, but still competitive in terms of represent data dependencies among instructions, [9] [10].
speed, especially for simultaneous multiprocessing and Dataflow graphs can be described as machine language for
floating-point operations. dataflow computers. Data is conveyed from one node to
another in data packets called tokens. This flow of tokens
enables nodes (instructions) which depend on them and fires
them.
TABLE I
COMPARISON OF PRESENTED ARCHITECTURES
196
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
Dataflow architecture can generally be divided into pure results in executing a program in parallel and better overall
dataflow architecture and hybrid dataflow architecture. Pure performance. Also, we need to further investigate the
dataflow firing rule says that an instruction can be executed as possibilities to narrow the gap between memory response time
soon as all input operands are available to it. It gives the and processors working frequencies. However, in order to be
dataflow model asynchronous behavior and self-scheduling of able to go forward and toward developing completely new
instructions. different processor architecture one must make thorough
Pure dataflow architecture is subsequently divided into investigation of existing processor architectures. That was the
static, dynamic and explicit token store architectures, while main reason for leading this investigation, and presenting the
the hybrid architecture utilizes some known control flow results of it within this paper.
mechanisms, [11]. Pure dataflow architecture executes a
program by receiving tokens, each containing data and tag,
processing instructions and sending out newly formed tokens,
REFERENCES
[9]. When a set of matched tokens (tokens with same tag) is
[1] John L. Hennessy, David A. Patterson, “Computer Architecture:
available at the execution unit, processing starts by fetching
A Quantitative Approach”, 2007
the appropriate instruction (with the same tag) from the [2] Nicholas FitzRoy-Dale, “The VLIW and EPIC processor
instruction store. The instruction is executed and the result is architectures”, 2005
generated, containing data and tag of the subsequent [3] William Stallings, “Computer organization and architecture
instructions which depend on it. designing for performance”, 8th edition, Prentice Hall, 2009
Pure dataflow architectures have some serious drawbacks, [4] Sivarama P. Dandamudi, “Guide to RISC processors: for
the major being is bad single thread performance. Other programmers and engineers”, Springer, 2005
problems are: the overhead produced by token matching, as [5] Prof. Vojin G. Oklobdzija, “Reduced Instruction Set
well as implementing efficient unit for matching tokens Computers”, 1999
[6] Zomaya, A.Y.H. , Parallel and Distributed Computing
(resolved to some extent in explicit token store architecture,
Handbook, McGraw-Hill, Ch. 21, Thomas M. Conte,
[12]). ”Superscalar and VLIW Processors”, 1996
Unfortunately drawbacks made it difficult to achieve direct [7] Hewlett – Packard, Precision Architecture :The Processor, HP
implementation of computers based on a pure dataflow model. journal, August 1986
For this reason, possibilities of converging dataflow and [8] Mark Smotherman, “Historical background for EPIC”, February
control-flow models were investigated and broad spectrum of 2011
hybrids (techniques and machines based on them) were [9] J. Silc, B. Robic, T. Ungerer, “Processor architecture: From
developed: threaded dataflow, course-grain dataflow, RISC Dataflow to Superscalar and Beyond”, Springer, 1999.
dataflow, dataflow with complex machine operations, [13], [10] A. L. Davis, R. M. Keller, “Data flow program graphs”, IEEE
Trans. On Computers, February. 1982.
[14].
[11] R. A. Iannucci, “Toward a dataflow/von Neumann hybrid
architecture”, Proc. 15th ISCA, May 1988.
V. CONCLUSION [12] G. M. Papadopoulos, “Implementation of a general-purpose
dataflow multiprocessor”, Tech. Report TR-432, MIT
Laboratory of Computer Science, Cambridge, Aug. 1988.
This stream line of processor architectures is highly [13] J. Silc, B. Robic and T. Ungerer, “Asynchrony in parallel
unlikely to die off. Other architectures are about to emerge, computing: From dataflow to multithreading, Parallel and
some similar to the previous architectures and other Distributed Computing Practices”, 1998.
completely different. The advance of technology requires new [14] R. Buehrer, K. Ekanadham, “Incorporating dataflow ideas into
and better processor architectures and exploitation of the von Neumann processors for parallel execution”, IEEE Trans.
concept of parallel computing. Overcoming the data On Computers, Dec. 198.
dependencies issue has to be done in order to achieve better
197
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
Abstract – This paper presents an innovative approach for of a coordinate geometry and a coordinate reference system. In
implementing visual portrayal of geographic features with point, general, a geometric object is a set of geometric points,
polyline (complex polylines) and polygon geometry for application
in mobile GIS applications. This approach relies on developed represented by their coordinates. Basic geometric objects are
XML styling language for defining custom styles and mapping points, polylines, and polygons [4].
layer subclasses to the specific style. Benefits of this approach are
extending basic styles and applying custom, user defined style to The importance of the visual portrayal of geographic data in
distinguish object that belong to the same layer. Visually separated GIS cannot be neglected. The skill that goes into portraying data
objects can emphasize a specific attribute value that is crucial for
fast identification of objects in time critical situations. Typical is what transforms raw information into an explanatory or
emergency situations require synergic response from various decision-support tool. Fine-grained control of the graphical
response team all accessing different aspects of the same geospatial representation of geographic features is a fundamental
data. Flexible and customizable style definition language is applied
to general vector data allowing separate field services to have
requirement for any professional mapping community. Allowing
custom visualization of shared community spatial data. user to define styling rules for visual portrayal of geographic
features requires the existence of a styling language that the user
Keywords – styling, GIS, XML, visualization. and GIS application can both understand [5].
198
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
199
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
is given in Fig 4 a). In line objects can define the color and line IV. FLEXIBLE SYMBOLOGY MECHANISM IN MOBILE
type and line endings. An example is given in Fig 4 b). For GIS
polygonal objects, we can define the color and type of linje
which marks the edge of the object, and then we can define the The mechanism is based on XML-defined mapping of
color and type of fill. An example is given in Fig 4 c). attributes of mobile on visual representation of the object. It is
necessary to define a hierarchy or a subset of data for a given
layer. Once we define subsets of data for a given layer, it is
necessary to prepare the appropriate raster or texture for the
visual representation of instances of classes. In this way, all
objects are classified into a special classes of one layer, if you
look at climate change visualization of natural disasters can be
more detailed graphically represented with visualization of
measured values. Disaster management can greatly facilitate
services on the ground to determine the appropriate plan of
action.
200
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
V. CONCLUSION
To improve the use of mobile applications, a mechanism for
flexible symbology of objects in mobile GIS applications has
created. This mechanism extends basic styles and improves
usability of mobile application. Big improvement has made in
creation custom styles that apply on each object based on
specified attribute value. Mechanism contains tree simple steps
to configure custom mapping. First step is to classify subsets of
objects for specified layer based on object attribute value.
Second step is creation of raster images or textures. Final step is
creating unique mapping. From user perspective, different kind
of services can apply their own simbology in order to visually
represent object from specific domain. This improvement allows
extending visual representation of same geo-spatial data
Fig. 6. Applying different style on one layer objects according to domain in which data are used.
Fig. 6. Shows four objects that belongs to same layer but they VI. ACKNOWLEDGMENTS
are visualized differently, based on previous mapping. Each
Research presented in this paper is funded by Ministry of
object has geometry that indicates location of object, other
Education and Science, Republic of Serbia as part of the
attributes describe objects in details. We configure mapping projects ‘Environmental Protection and Climate Change
between object attribute and symbol identifier. We create list of Monitoring and Adaptation’, Nr. III-43007 and ‘The
textures and include them in mapping. infrastructure for electronically supported learning in Serbia‘,
Nr. III-47003.
User can create object using mobile application and see
preview of the object based on previous mapping, shown on Fig.
REFERENCES
7. [1] Worboys, M., and Duckham, M., GIS: A Computing Perspective,
Second Edition, CRC Press, Boca Raton, FL, 2004.
[2] Chang, K., Introduction to Geographic Information Systems, Third
Edition, McGraw-Hill, New York, NY, 2005.
[3] The OpenGIS Abstract Specification, Topic 5: Features (Version
5.0), document 08-126, Open Geospatial Consortium Inc., January
2009, http://www.opengeospatial.org/standards/as
[4] OGC Reference Model (Version 2.0), document 08-062r4, Open
Geospatial Consortium Inc., November 2008,
http://www.opengeospatial.org/standards/orm
[5] Styled Layer Descriptor profile of the Web Map Service
Implementation Specification (Version 1.1.0), document
05-078r4, Open Geospatial Consortium Inc., June 2007,
http://www.opengeospatial.org/standards/sld
[6] Predic, B., Stojanovic, D., Djordjevic-Kajan, S., „Developing
Context Aware Support in Mobile GIS Framework“, 9th AGILE
Conference on Geographic Information Science, Visegrád,
Hungary, 2006
[7] Rančić, D., Predić, B., Dimitrijević, A. "Optimizations of raster
map visualization in mobile GIS", Proceedings of the 10th
WSEAS International Conference on COMPUTERS,
Vouliagmeni, Athens, Greece, July 13-15, 2006 (pp1191-1195)
ISSN:1790-5117, ISBN: 960-8457-47-5
Fig. 7. Creating new raster image for visual representation of object
with preview
201
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
202
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
interpolation is used for curve representation. Basic geometry • Centralized geospatial database for storing data
types are points, lines and polygons [5]. about electric power supply network. Elements of electric
Another model commonly used in GIS is the topological power supply networks are stored as a collection of
model [1]. Topological features are simple features structured geoobjects. Each geoobject is presented by its spatial
using certain topological rules. Introduction of topological component (coordinates or geometry) and thematic
relations between features simplifies data validation, modeling component (e.g. parameters for the conductors and
behavior of connected objects and optimization of different protective devices such as voltage level, conductor type,
spatial analysis. The network model is just a special case of length, construction and device type).
the topological model. The network data structures are used • GinisED Editor is a specialized tool for geographic
for modeling flows. Tree structure is used to model the radial editing of distribution network. It is a desktop application
network, while the graph structure is used to model cyclic developed in accordance with carefully studied needs and
networks. As new elements, topological model introduces requirements of customers. It is used for creation and
nodes and edges. A node is a distinguished point that connects editing of geographic schemes of the network, editing
one or several arcs. An edge is a line composed by a start and parameters of network elements and their connectivity.
an end node. The advantage of this model is the topological • GinisED Web is a WebGIS application that allows
information it is containing: every object includes information quick and easy positioning on a specific geographic area,
about the elements it is related to. search and selection of parts of electric power supply
Database management systems are vital part of every networks. This application implements information in-
modern operational GIS [1]. DBMS solutions provide GIS tegration functionalities and uses data from centralized
with standardized approaches for storing and, more geospatial database.
importantly, accessing and manipulating geographic data • WMS [9], WFS [9] and custom Web Services are
using some standard query language. GIS provides the components that provide GinisED Web and GinisED
necessary tools to load, edit, query, analyze, and display Mobile Server with raster maps and information
geographic data. Innovative work in the GIS field has considering geo-objects. WMS and WFS are components
extended standard relational DBMS solutions with specialized built according to Open Geospatial Consortium
support for storing and managing geographic data. specifications. Custom Web Services are used for data
There have been several attempts to define a standard for integration and enable GinisED Web with searching and
representing and processing geographic data in relational reporting capabilities.
databases. The GIS community, working under supervision of • GinisED Mobile Editor is tool for GPS survey of
ISO and OGC boards, has defined the core geographic types electrical consumers and relevant electrical assets.
and functions to be used in a relational DBMS and accessed GinisED Mobile Server supports mobile GIS applications
using the SQL language [6]. and provides map segments and synchronisation between
mobile database and centralized geospatial database.
III. GINISED – GIS FOR ELECTRIC UTILITY
GinisED is the geographic information system specially
designed for electric power utility companies. It uses the most
modern GIS technologies and methodologies for collecting,
editing, visualization and analysis of spatial electric power
supply network data. GinisED was developed by CG&GIS
Lab, Faculty of Electronic Engineering, University of Niš, and
is deployed in ED Jugoistok Niš (Serbian public electric
power supply company). GinisED helps ED Jugoistok Niš in
everyday operation and maintenance as it provides the
accurate, reliable spatial and non-spatial information to the
utility operational staff, and in turn help them better meet
customer needs [7][8].
GinisED (Figure 1) tools can be divided into three groups
[4][5]:
• Tools for collecting (digitization, map scanning and Fig. 1. GinisED architecture
vectorization using GPS and other specialized equipment)
and editing the spatial electric power supply network data.
• Tools for visualization of spatial electric power IV. MODEL FOR REPRESENTING POWER
supply network data for a certain geographic area. DISTRIBUTION NETWORK
• Tools for spatial analysis of electric power supply
network, potential or actual events in electric power In order to provide support for efficient spatial analysis we
supply network and risk factors for a certain geographic have developed a specific data model for representing electric
area. power supply network in GinisED. Power distribution
Basic components of the GinisED system are (Fig. 1): network usually contains features with line geometry (power
203
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
cables of different types) or point geometry (substations, implements power network elements and contains all thematic
poles, street lights, etc.). The GinisED system provides 2D attributes. Geometry of power distribution network is defined
visualization of all the elements of the power distribution through nodes (point geometry) and edges (line geometry).
network (Fig. 1). The major trace of power cables is mostly Additionally, every node element contains connection matrix
the same, i.e. under the streets, which results in overlapping that defines electrical connections between elements of power
lines. To avoid this overlap, in visualization we offset the distribution network (Fig. 4).
multiple power cables to increase the readability of the map
(schematic view).
204
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
the spatial context and to generate new information and VI. CONCLUSION
conclusions on the basis of this analysis.
A very important part of GinisED are tools for spatial Development of GinisED system for ED Jugoistok Niš has
analysis of electric power supply network, potential or actual started in 2004. Before GIS was implemented, data
events in electric power supply network and risk factors for a maintenance was erratic and time-consuming. Keeping track
certain geographic area. Spatial analysis in GinisED involves of changes was difficult because hard-copy maps or digital
two types of operations: attribute query (also known as non- CAD drawings were shared among the utility’s different
spatial query) and spatial query. Attribute query requires the departments.
processing of attribute data without referencing spatial For the past six years implemented GIS solution has
information. Spatial query involves selecting features based improved efficiency in overall company operations. GinisED
on location or spatial relationships, which requires processing quickly became an essential part of the ED Jugoistok Niš day-
of spatial information. to-day business. Today, GinisED is considered very important
data resource for the distribution analyses as it contains most
facility information including major network topological
structures. The circuit map display provided by the GinisED
system is the most natural graphic user interface for engineers.
In some applications, such as the trouble call analysis,
geographic maps provide more information to engineers than
the traditional one-line diagrams.
REFERENCES
[1] P. A. Longley, M. F. Goodchild, D. J. Maquire, D. W. Rhind,
Geographic Information Systems and Scince, ISBN 978-
0470721445, Wiley, 3rd ed., 2010.
[2] S. Zlatanova, F. Döner, P. van Oosterom, “Management and
Fig. 6. Spatial query: Find all network elements in specified region visualization of utility networks for local authorities: a 3D
GinisED provides simple point-and-click query capabilities approach” Electronic Government and Electronic Participation,
Joint Proceedings of Ongoing Research and Projects of IFIP
and sophisticated queries, analysis and display functions using
EGOV and ePart, Schriftenreihe Informatik 37, Trauner Verlag,
visual, user-friendly techniques (Fig. 6). GinisED provides pp. 459-474, 2011
timely information and decision making support to GIS users. [3] D. Pickering, J. M. Park, D. H. Bannister, 1993, “Utility
It helps users to solve problems, analyze geographic Mapping and Record Keeping for Infrastructure”, Urban
situations, extract necessary data and generate new Management and Infrastructure - Urban Management
information. Programme, Washington, D.C., Vol. 10, pp. ix-11.
While basic spatial analysis involves some attribute queries [4] J. I. Igbokwe, E. J. Emengini, “GIS in Management of
and spatial queries, complicated analysis typically require a Electricity Distribution Network: A case study of Onitsha-North
series of GIS operations including multiple attribute and L.G.A., Anambra state, Nigeria”,
http://www.gisdevelopment.net/application/utility/power/utility
spatial queries, alteration of original data, and generation of
p0022pf.htm , accessed 12.01.2011
new data sets. In order to support effective spatial analysis [5] OpenGIS Reference Model (Version 0.1.3), document 03-040,
GinisED provide powerful query builder that can combine Open Geospatial Consortium, Wayland, Mass.,
different types of attribute queries and spatial queries. http://portal.opengeospatial.org/files/?artifact_id=3836, March
2003.
[6] OpenGIS Simple Feature Specification for SQL (Revision 1.1),
document 99-049, Open Geospatial Consortium, Wayland,
Mass., http:// portal.opengeospatial.org/files/?artifact_id=829,
March 2003.
[7] A. Stanimirović, D. Stojanović, L. Stoimenov, S. Đorđević–
Kajan, M. Kostić, A. Krstić, “Geographic Information System
for Support of Control and Management of Electric Power
Supply Network”, Proceedings of IX Triennial International
Conference on Systems, Automatic Control and Measurements
SAUM, ISBN-86-85195-49-7, Niš, 2007.
[8] L. Stoimenov, A. Stanimirović, N. Davidović, M. Bogdanović,
A. Krstić, D. Nikolić, “GinisED Enterprise GIS - Framework
for the Utility of the Future”, CIRED 2011, Frankfurt, Germany,
6-9. June, ISSN:2032-9644, www.cired2011.org
[9] Open Geospatial Consortium, WMS and WFS Specifications,
2002, http://www.opengeospatial.org/
205
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
206
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
207
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
208
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
no reason the search to be directed to the region of the best Here k is chosen to cover about 10% to 50% of the
found so far (local optimal or near optimal) solution, because individuals in the population.
in the most cases it will not coincide with the global optimal c) Let xw1 ,…, xwk be the individuals in the current
solution. The same is valid for all known local optimal population having the worst (i.e. the greatest) F-values.
solutions, as well for all explored regions of the feasible Calculate the steps:
domain. The exploration of the whole feasible domain means yi = Pc – xwi , i = 1,…,k; (10)
that there is a guaranteed systematic diversification of the d) Reflect the k worst individuals towards Pc to
search process. A hybrid method performing systematically generate k new individuals (solutions):
diversified search (SDS-method) by means of separating the xnewi = Pc + yi, i = 1,…,k. (11)
feasible domain in sub-regions (cones having a common Round off each xnewi is rounded off to its near integer
vertex) is proposed in [12]. The systematic diversification of point. In case someone new solution is infeasible, i.e. the
the search consists in exploring the cones obtained one by constraints (2)-(3) are violated, restrict the step length:
one. y = θ. y, (12)
Let the feasible domain be denoted by X and let the where θ ∈(0,1).
Tchebicheff center (the point located at the maximal e) In case someone of the so generated individuals is
Euclidean distance from the constraint surfaces) be xtch ∈ X. better than one of the current population, the better individual
We assume that xtch is obtained by means of a method for replaces the worse. If there aren’t generated better individuals
solving convex problems with continuous variables. Then xtch continue by Step 5, otherwise go to a).
is rounded off to the nearest integer point itch. Step 5. Diversification phase
a) Make step β(v(j) – cs) along each ray starting at cs
A. Wave-spreading strategy and passing through the simplex vertices v(j), j = 0,…,n; in
outside direction, so that the new central solutions cs(j), j =
Step 1. Generate a regular simplex with n+1 vertices, 0,…,n; are generated.
using itch as one vertex. The other simplex vertices are b) Around each point cs(j) are generated p uniform
generated in the following manner: distributed solutions’ vectors like in Step 3 and build (n+1)
itch j + ϕ1 if j≠i new populations Pj.
v(i)j = i = 1,…,n; j = 1,…,n; (5) c) Perform the Intensification phase for each new
population Pj , j = 0,…,n;.
itch j + ϕ2 if j=i
d) Make step β(cs – v(j)) along each ray starting at cs in
the opposite of sub-step a) direction, so that the new points
( n + 1) + n − 1 cs(j), j = 0,…,n; are generated. Perform the sub-steps b) and c).
ϕ1 = α.[ ] (6)
n 2 Step 6. Alternate the Diversification and the
(n + 1) − 1 Intensification phase in the same way until reaching the
ϕ2 = α.[ ] (7) boundaries of the feasible region.
n 2
Step 7. Perform simple local search around each found
Let itch be denoted as v(0). Round off each v(j), j = 1,…,n; to locally optimal solution to precisely locate all found optima.
its nearest integer point. There are (n+1) combinations of n REMARKS:
vertices, correspondingly for each facet of the simplex. The initial simplex gets larger and larger in the search
Step 2. Calculate the components of the simplex weight space like a wave raised by a stone in a lake.
center as follows: The parameter β depends on the size of feasible region.
n
For relative small domains the greatest component of β(v(j) –
∑v
( j)
i cs) is 10% of the greatest among the values Qj = uj – lj, for j =
j =0
csi = , i=1,…,n (8) 1,…,n; For larger domains β should be chosen smaller.
n +1 For large feasible domains also the rays passing through cs
Round off each component csi to its nearest integer value. and through each of the (n+1) weight centers of simplex
Step 3. Create an initial population P0 around the weight vertices determining each simplex facet should be explored in
center cs, containing p uniform distributed solution vectors, the way described above.
generated by using deviation of ±δ, where δ is a constant % of
corresponding component (for example δmax = ±1%).
Step 4. Intensification phase B. Slicing strategy
Here is used a reflection like the idea in the simplex
method by Nelder and Mead (see [20]). In this strategy the feasible domain will be separated
a) Order the individuals (solutions) in the current (sliced) in t sub-regions as follows:
Step 1. Compare the values Qj = uj – lj, for j = 1,…,n; and
population in increasing order of their F-values.
find out the maximal value Qj(max) for fixed j = jmax. Let q be
b) Calculate the weight center Pc of first k individuals:
the integer part of Qj(max)/t:
1 k ( j)
Pc = ∑x
k j =1
(9) q=
Q max
j
(13)
t
209
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
and let lj1 = lj, uj1 = lj1+q–1, lji = uji-1+1; uji = uji-1+q–1; for The corresponding objective function values are:
i=2,…,t–1, and ljt = ujt-1+1; ujt = uj, where j = jmax. F(x(1)) = 3764084, F(x(2)) = 3742064, F(x(3)) = 3720244,
Step 2. Divide the constraint system (3) into t constraint F(x(4)) = 3816053, F(x(5)) = 3793853, F(x(6)) = 3771853,
sub-systems: F(x(7)) = 3750053, F(x(8)) = 3828244, F(x(9)) = 3806224,
lj ≤ xj ≤ uj; j = 1,…,n; j ≠ jmax; F(x(10)) = 3784404;.
lji ≤ xji ≤ uji; j = jmax; i = 1,…,t. (14) For k = 10% we choose the best individual: x(3). The worst
Each sub-region is defined by the constraint systems (2), (4) individuals are x(8), x(4) and x(9). The worst individuals are
and by one constraint sub-system from (14). reflected towards x(3). Three new better individuals are
Step 3. Perform diversification of the search process by generated and they replace the worst individuals x(8), x(4) and
going from one sub-region to another, generating the initial x(9). Proceeding in this way until no better individuals are
population at random with uniform distribution around the generated, and then performing a simple local search, the
Tchebicheff center of the current sub-region. Then perform procedure finds out the locally optimal solution x(3*) = (6100,
the Intensification phase described in Wave – spreading 3400) with objective function value F(x(3*)) = 12.
strategy (Step 4.) in each sub-region. The generated simplex has the following rounded off
vertices: v(0) = (5000, 5000), v(1) = (5003, 5010) and v(2) =
(5010, 5003). We will consider the performance of this
C. Hybrid strategy
strategy along one exploring ray, say (v(0 – cs) = (–4, –4).
Proceeding with β = 250 at v(0) the search procedure creates
This strategy consists in slicing the feasible domain in the
consecutively 5 initial populations around the calculated
way described in Slicing strategy. After that the search
central solutions cs(1) = (4000, 4000), cs(2) = (3000, 3000), cs(3)
procedure performs a Wave – spreading strategy in each sub-
= (2000, 2000), cs(4) = (1000, 1000), cs(5) = (0, 0). The last
region.
population reaches the boundaries of the feasible domain, so
that this direction is explored. The third generated population
III. ILLUSTRATIVE EXAMPLE around cs(3) = (2000, 2000) comes in the sub-area A1, so that
the intensification phase finds out the optimum F(x(1*)). The
same is repeated with the fourth and fifth generated
Let us consider the following two-dimensional example.
population.
Five sub-areas in the feasible domain are defined:
Then the procedure explores the opposite direction, creating
A1 = {0 ≤ x1, 0 ≤ x2, 21x1 + 20x2 – 84000 ≤ 0}
again five initial populations around the calculated central
A2 = {0 ≤ x1, x2 ≤ 10000, 0 < 21x1 + 20x2 – 84000, solutions cs(6) = (6000, 6000), cs(7) = (7000, 7000), cs(8) =
7x1 – 5x2 + 15000 ≤ 0} (8000, 8000), cs(9) = (9000, 9000), cs(10) = (10000, 10000).
A3 = {x1 ≤ 7200, 0 ≤ x2, x2 ≤ 10000, The last three populations come in the sub-area A5, so that the
0 < 21x1 + 20x2 – 84000, 0 < 7x1 – 5x2 + 15000} intensification phase finds out the optimum F(x(5*)).
A4 = {7200 < x1, x1 ≤ 10000, x2 ≤ 5900, 0 ≤ x2} Going on along the other two exploring rays in both
A5 = {7200 < x1, x1 ≤ 10000, 5900 < x2, x2 ≤ 10000} possible directions the search procedure finds out also the
The optimization problem is: optima F(x(4*)) and F(x(2*)).
Min F(x) = 10 + (x1 – 2500)2 + (x2 – 1000)2 if (x1, x2)∈ A1; During the exploration of whole feasible domain 31
7 + (x1 – 1500)2 + (x2 – 7000)2 if (x1, x2)∈ A2; intensification phases are performed.
12 + (x1 – 6100)2 + (x2 – 3400)2 if (x1, x2)∈ A3; Slicing strategy
11 + (x1 – 9800)2 + (x2 – 2100)2 if (x1, x2)∈ A4; We choose the component x1 as slicing component. The
3 + (x1 – 8100)2 + (x2 – 9700)2 if (x1, x2)∈ A5; created sub-areas are: B1: 0 ≤ x1 < 1000; 0 ≤ x2 < 10000;
subject to: 0 ≤ x1 ≤ 10000; B2: 1000 ≤ x1 < 2000; 0 ≤ x2 < 10000; …
0 ≤ x2 ≤ 10000; B10: 9000 ≤ x1 ≤ 10000; 0 ≤ x2 < 10000;
This problem has five local optima – one per each sub-area: In each sub-area is generated an initial population randomly
x(1*)= (2500, 1000), x(2*)= (1500, 7000), x(3*)= (6100, 3400), with uniform distribution. Performing the above described
x(4*)= (9800, 2100), x(5*)= (8100, 9700); intensification phase in each sub-area the search procedure
The corresponding objective function values are: finds out all locally optimal solutions. To explore the whole
F(x(1*))=10; F(x(2*)) = 7; F(x(3*)) = 12; F(x(4*)) = 11; feasible domain 10 intensification phases are performed.
F(x(5*)) = 3. Hence the global optimal solution is x(5*). Some of them are more time-consuming than the
Wave-spreading strategy intensification phases performed by Wave-spreading strategy.
Starting at the Tchebicheff center itch = (5000, 5000) the Hybrid strategy
simplex with vertices (5000, 5000), (5002.588, 5009.659) and This strategy also finds out all possible local optima. Here
(5009.659, 5002.588) is generated. The weight center of the the value of parameter β remains the same like in the Wave-
simplex is cs = (5004, 5004). spreading strategy, because the component x2 keeps its
The population P(0) includes 10 points (individuals): variation interval unchanged. This leads to great steps along
x(1) = (4994, 4994), x(2) = (5004, 4994), x(3) = (5014, 4994), the exploring rays and in some directions already the first
x(4) = (4985, 5004), x(5) = (4005, 5004), x(6) = (5005, 5004), generated initial population is infeasible. For this reason β
x(7) = (5015, 5004), x(8) = (4994, 5014), x(9) = (5004, 5014), should be reduced in half and this is repeated until the
x(10) = (5014, 5014);. generating a feasible population becomes possible.
210
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
Comparisons with other algorithms [3] Colorni A., M. Dorigo and V. Maniezzo, „An Investigation of
The described strategies are compared with scatter search Some Properties of an Ant Algorithm“, in Parallel Problem
and with particle swarm optimization. Starting with the initial Solving from Nature 2, R, Männer and B. Mandrieck eds.,
population P(0) these two algorithms are able to find out only North-Holland: Amsterdam, 1992, pp. 509-520.
[4] Damavandi N. and Safavi-Naeini S., “A hybrid evolutionary
one locally optimal solution, and this is x(3*). Better
programming method for circuit optimization”, In Proc. IEEE
performance is achieved in case the initial population is Transactions on circuits and systems – I: Regular papers, vol.
enough dispersed. The scatter search has better chances to 52, No. 5, May 2005, pp. 902-910.
find out the global optimal solution in case the limit of [5] Eberhart R. C. and J. Kennedy, “A new optimizer using particle
iterations is large. In this case it needs more than 1000 swarm theory”, Proceedings of the Sixth International
generations. Symposium on Micromachine and Human Science, Nagoya,
The presented problem may be solved by genetic algorithm, Japan, pp. 39-43, 1995.
using niches. In this way all optima can be found but this [6] Garey M. R. and Johnson D. S., “Computers and Intractability:
performance will be essentially more time consuming than the A Guide to the Theory of NP-Completeness”, W. H. Freeman,
San Francisco 1979.
proposed solution procedures. [7] Glover F., “Heuristics for integer programming using surrogate
constraints”, Decision Sciences 8, 1977, pp. 156-166.
IV. CONCLUSIONS [8] Glover F., “Future path for integer programming and links to
artificial intelligence”, Computers & Operations Research 13,
1986, pp. 533-549.
The presented strategies for fast systematic diversification [9] Glover F., “Tabu Search for Nonlinear and Parametric
of the search have the following advantages: Optimization (with Links to Genetic Algorithms)”, Discrete
• They systematically diversify the search process, Applied Mathematics, “Viewpoints on Optimization”, 1991.
avoiding in this manner the trap of local minima. [10] Glover F., “Tabu search and adaptive memory programming –
• They explore roughly the whole feasible domain and advances, applications and challenges”, in Advances in
have good chances to find out the global optimal Metaheuristics, Optimization and Stochastic Modeling
Technologies, Barr, Helgason and Kennington eds.-, Kluwer:
solution.
Boston, MA., 1997, pp. 1-75.
• The applying of local search technique at the end of the [11] Goldberg D. E. Genetic Algorithms in Search, Optimization and
search process guarantees the good quality of the Machine Learning, Addison Wesley, Reading, Mass, 1989.
obtained solution. [12] Guliashki, V., (2007) “A Hybrid Population Based Method
• The proposed strategies have a better convergence to the Solving Convex Integer Optimization Problems”, In:
global optimum in comparison to other global search Proceedings of ICEST2007, (Editor Prof. Dr. Mitrovski, C.),
algorithms, in which the search process does not perform June 24 – 27, 2007, Ohrid, Macedonia, vol. I, pp. 249-252.
a systematic diversification. [13] Guliashki V., C. Korsemov, H. Toshev, (2010) “Elitism Based
Evolutionary Algorithm for Discrete Optimization Problems”,
• They are simpler and don’t require large computer In: Proceedings of ICEST2010, (Editor Prof. Dr. Mitrovski, C.),
memory and complex memory organization in June 23 – 26, 2010, Ohrid, Macedonia, vol. I, ISBN: 978-9989-
comparison to other global search strategies like Tabu 786-57-0, pp. 281-284.
search. [14] Hertz A., Kobler D., „A Framework for Description of
• They use populations with relatively small size. This Population Based Methods“, Tutorials and Research Reviews,
makes them efficient in solving large dimensional 16-th European Conference on Operational Research Brussels,
problems. Belgium, 1998, pp. 48-59.
[15] Holland J. H., „Adaptation in Natural and Artificial Systems”,
• The proposed strategies are easy for computer
The University of Michigan Press: Ann Arbor, MI, 1975, MIT
programming implementation. Press, 1992.
[16] Kennedy J. and R. C. Eberhart, “Particle Swarm Optimization”,
ACKNOWLEDGEMENT Proceedings of IEEE International Conference on Neural
Networks, Piscataway, N. J., 1995, pp. 1942-1948.
[17] Krusienski D. J. and Jenkins W. K. “Design and performance of
The authors gratefully acknowledge the support of adaptive systems, based on structured stochastic optimization
Bulgarian National Science Fund, Grant No DTK02/71 “Web- strategies”, IEEE Circuits and Systems, Vol.5, No.1, first
Based Interactive System, Supporting the Building Models quarter 2005, pp.8-20.
and Solving Optimization and Decision Making Problems”. [18] Nemhauser G. L. and Wolsey L. A. “Integer and Combinatorial
Optimization”, Wiley, New York. 1988.
[19] Pirlot M., “Heuristic Search Methods”, Oper. Res. Designing
REFERENCES Practical Solutions; Tutorial and Research Review Papers, Euro
XIII/OR 36, The joint EURO/Oper. Res. Society Conference;
[1] Colorni A., M. Dorigo and V. Maniezzo, “Positive Feedback as Univ. of Strathclyde, Glasgow, 19-22, VII. 1994. pp. 180-201.
a Search Strategy”, Department of Electronics, Politechnico di [20] Reklaitis G.V., Ravindran A., Ragsdell K. M., Engineering Op-
Milano, Italy, Working paper 91-16, 1991. timization. Methods and Applications, John Wiley & Sons, 1983.
[2] Colorni A., M. Dorigo and V. Maniezzo, “ Distributed [21] Taillard E. D., Gambardella L. M., Gendreau M. and J.-Y.
Optimization by Ant Colonies”, in Proceedings of the First Potvin, “Adaptive Memory Programming: A Unified View of
European Conference on Artificial Life (ECAL-91), F. J. Varela Metaheuristics”, Tutorials and Research Reviews, 16-th
and P. Bourgine eds., The MIT Press: Cambridge, MA, 1991, European Conference on Operational Research Brussels,
pp. 134-142. Belgium, 1998, pp. 30-38.
211
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
1
Igor Antolović is with the Faculty of Electronic Engineering,
Aleksandra Medvedeva 14, 18000 Nis, Serbia,
E-mail: igor.antolovic@elfak.ni.ac.rs.
2
Dejan Rančić is with the Faculty of Electronic Engineering,
Aleksandra Medvedeva 14, 18000 Nis, Serbia,
E-mail: dejan.rancic@elfak.ni.ac.rs.
3
Vladan Mihajlović is with the Faculty of Electronic Engineering, Fig.1. Color mapping (left) and isoline extraction (right)
Aleksandra Medvedeva 14, 18000 Nis, Serbia,
E-mail: vladan.mihajlovic@elfak.ni.ac.rs. Color mapping approach can be most easily implemented
4
Dragan Mihić is with the Republic Hydrometeorological Service and uses a quite straightforward approach. The basic idea
of Serbia and South East European Virtual Climate Change Center,
E-mail: dragan.mihic@hidmet.gov.rs
behind color mapping is to traverse through all scalar field
5
Marija Đorđević is with the Republic Hydrometeorological values and map those values into colors. Additionally color
Service of Serbia and South East European Virtual Climate Change values can be interpolated in order to get a smoother output.
Center, E-mail: mapuja@gmail.com Usually instead of RGB (Red Green Blue) color model, HSB
(Hue Saturation Brightness) is used considering that it defines
more practical color scheme. Also an interesting
212
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
recommendations on using colors with climate data can be • Use the calculated index in order to extract
found in [7]. information of which edges are intersected by the
On the other hand when isoline extraction is considered it is isoline from the precalculated edge table.
necessary to start from its very definition. For a given isovalue • By using linear interpolation determine the exact
(c) an isoline consists of a set of points defined by: points of intersection of the isoline and the cell
edges.
I = {(x, y) | S(x, y) = c} (2) • Connect the intersection points in order to get the
current isoline segment.
Meaning that isolines consists of all points that share a
constant isovalue (c). On the other hand when it comes to
practical isoline extraction there are two basic methods:
• Contour tracing
• Isoline segment extraction using Divide and Concur
approach
213
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
Let the 2D scalar field be defined as: By processing all cells in this way and generating besier
isoline segments, a drastic increase in quality can be noticed
S = f ( x, y ) (3) as the isolines show smooth flow through the cells.
Finally a simple polygonal scheme can be derived from the
The gradient can be calculated as follows: original Marching Squares set as shown on Fig.5. This new
set can be used to generate color filled isoareas. By combining
∂S ∂S multiple layers of isoareas a multicolor isoarea can be
∇S = i + j (4) generated as shown on Fig.6. The only problem with this
∂x ∂y approach is that it is order dependent. It is obvious that the
In the practical case where a discrete scalar field is used the isoareas must be sorted in increasing isovalues going from
gradient components can be calculated by using central bottom to top.
differences as follows:
S ( x + 1, y ) − S ( x − 1, y )
g ( x, y ) x = (5)
2∆x
S ( x, y + 1) − S ( x, y − 1)
g ( x, y ) y = (6)
2∆y
214
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
a) b) c)
Fig.7. a) Smooth isoareas with normals b) Non-smooth isolines on map c) Comparison of smooth and non-smooth details
215
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
Efficient Implementation of
BDD Packages on the GPU Platform
Miloš M. Radmanović1 and Dušan B. Gajić2
Abstract – Efficient construction and manipulation of Binary Parallel computing can be used to efficiently solve large-
Decision Diagrams (BDDs) is an important component of scale problems, either by distributing computational loads
Computer Aided Design (CAD) tasks. One solution to improve the among processors or by utilizing the large memory in parallel
performance of BDD packages is to perform some of the BDD networked workstations. Parallel processing of BDDs can be
operations in parallel using the Graphics Processing Unit (GPU).
The recent evolution of GPU frameworks for programming general
used both to reduce the BDD algorithm running time and to
purpose computations, such as the OpenCL and Nvidia CUDA, has extend the memory limitations which exist in the traditional
offered GPUs as a powerful and attractive choice for developing single-processor sequential computing.
high-performance numerical applications. In this work, we propose In order to increase the performance of BDD packages, the
an efficient implementation of a BDD package which distributes concept of parallelism has been introduced to the BDD
computations over central processing units (CPUs) and GPUs. The representations and algorithms in several papers. In [9], a
proposed implementation exploits various sources of parallelism parallel algorithm for the construction of BDDs is described.
that can be found in BDD packages. The experimental results The algorithm is motivated by the fact that the construction of
confirm that the application of the proposed solution leads to a BDD, for certain large or particularly complex Boolean
significant computational speedups in BDD packages.
functions, can be a very time-consuming task. In order to
Keywords – Binary decision diagrams, BDD package, parallel overcome limitations of computational resources, research in
implementation, graphics processing unit, GPU computing. [10] presents an approach which distributes the BDD data
structure across multiple networked workstations. Further,
several techniques are introduced which allow parallelization
I. INTRODUCTION of depth-first search algorithms on a BDD. Reference [11]
presents a parallel algorithm for BDD construction targeted at
Binary Decision Diagrams (BDDs) are the dominant data shared memory multiprocessors and distributed shared
structure for representing Boolean functions in CAD memory systems. The results obtained using a shared memory
applications. The application of BDDs is further extended multiprocessors system show speedups of over 2×, with four
with their use in various areas of computer science and processors, and up to 4×, with eight processors. Alongside the
engineering. In practice, the success of BDD representations research on parallel BDD construction, various BDD-
depends on the abillity to efficiently manipulate large BDDs. algorithm parallel implementations were developed for
Therefore, considerable research has been conducted in order networks of workstations [12-14]. In [15], some key
to develop more efficient implementations of BDD algorithms algorithms for performing BDD operations are first described
[1-5]. and, afterwards, an approach to their parallelization is
BDD algorithms are usually built on top of BDD packages. described, with a goal to achieve efficient execution of BDD
Many BDD package implementations have been developed in packages on multicore CPUs. The technique of general
a variety of programming languages and most of them are purpose computing on the GPU (GPGPU) enables parallel
freely available as public domain on the Internet. The choice processing of non-graphics algorithms using graphics
of a BDD package for a certain application is typically guided hardware. Only recently, the possibility of using GPUs to
by the following package characteristics: functionality, solve complex problems in logic design has been explored by
software interface, robustness, reliability, portability, support, researchers, for example in [16-20].
and performance. In most cases, the performance of a BDD Motivated by the exisiting research on efficient execution
package is of major concern. Parameters which influence the of parallel BDD operations on multicore CPUs and possibility
performance of a BDD package include the choice of the of using GPUs, in this paper we propose an efficient
programming language and the software and hardware implementation of a BDD package using the GPU platform.
platforms, BDD node structure, type of garbage collection, The proposed implementation exploits the various sources of
unique and operation hash table strategies [6-8]. parallelism that exist in BDD packages. We address several
topics considering parallel computations in BDD packages
1
Miloš M. Radmanović is with the Faculty of Electronic and present their mapping to the GPU architecture. The
Engineering, Aleksandra Medvedeva 14, 18000 Niš, Serbia, E-mail: experimental results confirm that the application of the
milos.radmanovic@gmail.com proposed implementation of a parallelized BDD package leads
2
Dušan B. Gajić is with the Faculty of Electronic Engineering, to significant computational speedups over traditional C/C++
Aleksandra Medvedeva 14, 18000 Niš, Serbia, E-mail: implementations processed on CPUs.
dusan.b.gajic@gmail.com
216
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
The paper is organized as follows: Section 2 shortly algorithms is typically based on the BDD node data structure,
introduces the BDD representation of Boolean functions. unique and operation tables, and depth-first BDD traversal.
Section 3 describes the structure of a BDD package and the The decisions made in defining the BDD node data
basic BDD algorithms. Section 4 presents the GPU as a structure have impact on memory space requirements for
computing platform. Section 5 discusses the operations in the storing node objects. There are many choices for defining a
BDD package for which we introduce the GPU processing. BDD node object, but every node usually contains: an id, then
Section 6 shows experimental results obtained with the cofactor, else cofactor, next pointer, and reference counter
proposed implementation. Finally, Section 7 offers some [22]. The BDD construction is based on applying the traversal
concluding remarks and directions for future work. in a depth-first manner.
The maintance of a BDD representation is improved by
storing BDD nodes in a dictionary, called the unique table.
II. BINARY DECISION DIAGRAMS The unique table maps a unique triple of (v, g, h) for a BDD
node, where v is the variable identifier, g is the node
BDDs consist of non-terminal (decision) nodes, 0-edges connected to the "1" edge, and h is the node connected to the
and 1-edges attached to all non-terminal nodes, a ‘0’ terminal "0" edge. The unique table is a hash table with the hash
node, and a ‘1’ terminal node, as shown in Fig.1. The non- collisions resolved by chaining. A hash function is applied to
terminal node with no upper nodes is called a root node. As it the triple to obtain the index in the unique table of the start of
can be seen from Fig.1, a variable is related to every non- a collision chain of nodes. Comparing the unique triple
terminal node, such that every path from the root node to one against the nodes in the collision chain addresses the look up.
of the terminal nodes respects the same variable ordering. The efficient implementation of almost all recursive BDD
A Boolean function can be converted into an equivalent manipulation algorithms is made possible by the operation
function by performing Shannon expansion based on the fixed table. This table is also implemented as a hash table with the
variable ordering. This new function can be represented by a collisions resolved by chaining. The collision lists can be kept
binary tree. The corresponding BDD is constructed from this sorted to reduce the number of memory accesses required on
binary tree by applying the two reduction rules (redundant average for the lookup. Table sizes which are prime numbers
node elimination and equivalent sub-graphs sharing). The require an expensive modulo operation. Table sizes that are a
Boolean operations such as the logical AND, logical OR, etc., power of 2 are often better handled by memory management.
can be achieved by using BDD manipulations, which have an As the variable ordering can have significant impact on the
average time complexity propositional to the size of BDDs. It size of a BDD, dynamic variable reordering component is a
is well known that the size of the BDD for a given Boolean fundamental part of all modern BDD packages. Dynamic
function depends on the variable order for the function. The variable reordering algorithms are generally based on the
strength of BDDs is that they can represent Boolean function shifting algorithm [23]. The BDD variable order changes by
data with high level of redundancy in a compressed form. exchanging nodes in one level with nodes in the neighbouring
levels. Dynamic variable ordering should best be invoked as
an asynchronous process that can be activated at any time
during the BDD manipulation. Dynamic variable ordering is a
complex problem since finding an optimal ordering is NP-
hard. Futher, small changes in the BDD ordering may have
significant impact on both the space and time requirements.
BDD computations are memory intensive, especially when
large BDDs are involved. They not only require a lot of
memory, but also frequent accesses to many small data
structures. Furthermore, many intermediate BDD results are
created to arrive at a resulting BDD. These computations may
Fig. 1. BDD representation of the function defined by the truth table have poor memory handling, as there is not a solution to
F = [00101111]T. ensure that the accessed BDD nodes are close in memory. It is
important to have a garbage collector component [24] to
III. BDD PACKAGES automatically remove BDD nodes that are no longer useful. In
modern BDD packages, garbage collector component is based
BDD packages are deployed in many software tools, on reference counting and the recycling of nodes for later
particularly in the area of logic design, and they typically deal reuse. Garbage collection is activated when the percentage of
with the following common implementation features [1]. A the unusable BDD nodes reaches a threshold. Unusable BDD
BDD package has three main components [21]: nodes are nodes with zero reference counts. Some of unusable
The BDD algorithm component, BDD nodes may become usable again (recycled) if they are
obtained as results of new subproblems. Thus, in the case
Dynamic variable reordering component,
when BDD nodes change state between „usable“ and
Garbage collection component.
„unusable“ frequently, garbage collection can reduce the
The BDD algorithm component builds the result BDDs for benefit of the operation tables and decrease the overall
various Boolean operations. The implementation of these performance of a BDD package.
217
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
IV. THE GPU ARCHITECTURE AND GPGPU operation is a crucial component of the Apply procedure
which is central to the BDD construction and manipulation
Processor frequency progress, which followed the Moore’s [1]. The lookup_insert operation returns the key, if it already
law for more than four decades, reached a limit in 2003, exists in the hash table, or, otherwise, inserts the key.
mostly due to the inability to further solve the problems of Reference [15] shows how this operation can be safely
heat dissipation and energy consumption. Since then, there are executed in parallel on multicore processors. The
two approaches in the development of computer architectures. lookup_insert operation within the BDD algorithm component
The multicore approach, typical for CPUs, seeks to maintain in our BDD package is, therefore, implemented as an OpenCL
the execution speed of sequential programs while moving into kernel which performs the same function over different keys.
multiple cores. In contrast, the manycore approach, found in Since GPUs use hardware multithreading [25, 26, 27], this
GPUs, focuses more on the execution throughput of parallel automatically allows simultaneous execution of as many
applications. This resulted in a rapid evolution of GPU lookup_insert operations as there are active GPU threads.
architectures. The GPU evolution started from fixed-function The effectiveness of garbage collection component can
hardware specialized for rendering computer graphics, which have significant impact on both space and time requirements
first appeared in 1999, and developed into a massively of a BDD package. When garbage collector removes unusable
parallel, scalable, and fully programmable platform BDD nodes, the unique and the operation table entries that
characterized by exquisite memory bandwidth and reference these nodes must also be removed to eliminate
computational power. Due to this, many of the general- unusable references. If garbage collection is not invoked
purpose applications which were processed on CPUs are now frequently enough, the memory usage can be greatly
re-implemented in order to efficiently harness the GPU increased. An OpenCL kernel for garbage collection is
resources. For more details on recent changes that made developed so that each GPU thread removes an entry from the
GPGPU possible, see [25, 26, 27, 28]. hash tables. Since thousands of GPU threads can be active at
The GPU parallel processing model is based on a large the same time, this leads to a massively-parallel GPU garbage
number of processor cores which can directly address into a collection. The transfer of the garbage collection task to the
global GPU memory. The GPU architecture follows the single GPU, also allows the CPU to be free to perform other tasks
program, multiple data (SPMD) paradigm [26, 27], features a for which it may be more suitable.
multi-level memory hierarchy and has simple branching
circuits. In SPMD computing, a large number of threads VI. EXPERIMENTAL RESULTS
execute in parallel the same function, called a kernel, over
different data. In this section, we compare the performance of our GPU
Application Programming Interfaces (APIs) most often accelerated BDD package implementation, which incorporates
used for the development of GPGPU programs are Nvidia’s the before-mentioned OpenCL kernels, and a single-threaded
CUDA and Open Computing Language - OpenCL. CUDA is a C/C++ implementation of the BDD package on the CPU. For
vendor-specific development framework and only supports the comparison, we use a set of well-known standard
execution on Nvidia’s GPU hardware. Therefore, we give benchmarks. Table I presents a view on the performance of
advantage to OpenCL which is hardware agnostic. Further, the BDD package computations performed in the basic BDD
the OpenCL C programming language, included in the construction algorithm on the CPU and the GPU.
framework, allows development of programs that are both
TABLE I
accelerated and portable across a wide set of devices (CPUs,
COMPARISON OF THE BDD CONSTRUCTION TIMES FOR THE BDD
GPUs, Field Programmable Gate Arrays (FPGAs), Digital
PACKAGE ON THE CPU AND THE GPU
Signal Processors (DSPs), Cell processors, embedded
processors) [28]. computation time [s]
Benchmark in / out / cubes
CPU GPU
V. GPU ACCELERATION IN THE BDD PACKAGE alu4 14 / 8 / 1028 0.15 0.08
apex1 45 / 45 / 206 5.18 0.81
Motivated by the existing work on the parallelization of apex2 39 / 3 / 1035 3.31 0.62
components in BDD packages, described in Section 1, we apex5 117 / 88 / 1227 0.30 0.17
explored various sources of parallelism that exists within the cordic 23 / 2 /1206 0.06 0.04
algorithms included in BDD packages in order to develop an cps 24 / 109 / 654 0.15 0.09
efficient model of parallel BDD operations on GPUs. The misex2 25 / 18 /29 0.05 0.03
components of the BDD package that take advantage of the misex3 14 / 14 / 1848 0.03 0.02
GPU processing in our present solution are the BDD table3 14 / 14 / 135 0.02 0.02
algorithm and the garbage collection components. table5 17 / 15 / 158 0.01 0.01
The effectiveness of caching within unique and operation
tables of the BDD algorithm component strongly influences The test platform features an Intel i7-920 quad-core
the number of subproblems generated in the BDD algorithm processor, operating at 2.66 GHz, and has 4 GBs of DDR3-
task execution. Thus, the hash tables (unique and operation 2000 RAM. GPU that is used is an Nvidia GeForce GTX
tables) in a BDD package need to support concurrent 560Ti with 1GB of GDDR5 RAM, composed of 384
execution of the hash operation lookup_insert(key). This
218
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
streaming processors. The OpenCL kernels are developed [9] S. Kimura, E.M. Clarke, "A parallel algorithm for constructing
using the AMD Accelerated Parallel Programming SDK 2.6. binary decision diagrams", in IEEE Intl. Conf. on Computer
The size of the unique and the operation tables is limited to Design: VLSI in Computers and Processors, 1990, 220-223.
[10] T. Stornetta, F. Brewer, “Implementation of an efficient parallel
8191 entries. The garbage collection is activated if the hash
BDD package”, in Proc. of Design Automation Conf., Las
tables exceed the 80%-full marker. All benchmarks are used Vegas, USA, 1996, 641-644.
in the Espresso-mv or pla format [29] and the computation [11] B. Yang, D. R. O'Hallaron, “Parallel breadth-first BDD
times are reported in seconds. construction”, 9th ACM SIGPLAN Symposium on Principles and
As it can be seen from Table I, the addition of the GPU Practice of Parallel Programming, 1997, 145-156.
acceleration to the BDD package brings clear performance [12] D. Caban, D. Milford, "A parallel BDD engine for logic
benefits over the CPU-only solution. The speedup, in terms of verification", in Proc. 5th Annual IEEE Int. ASIC Conf. and
the BDD construction algorithm computation time, for most Exhibit, 1992, 499-502.
of the cases is substantial and varies from 6.4× to 1.5×. [13] R.K. Ranjan, J.V. Sanghavi, R.K. Brayton, A. Sangiovanni-
Vincentelli, "Binary decision diagrams on network of
However, it should be noted that the speedup may not be
workstations," IEEE Int. Conf. on Computer Design: VLSI in
achieved in some cases, e.g., in the case of the benchmark Computers and Processors, 1996, 358-364.
table3, because the construction of the BDD in this case is not [14] K. Milvang-Jensen, J. Alan, "BDDNOW: A parallel BDD
enough computationally-intensive to benefit from the package", in Proc. 2nd Int. Conf. on Formal Methods in
introduction of the GPU. Computer-Aided Design, 1998, 501-507.
[15] H. Yuxiong, “Multicore-enabling a binary decision diagram
algorithm”, Intel Software Network, 2009,
VII. CONCLUSION http://software.intel.com/en-us/articles/multicore-enabling-a-
binary-decision-diagram-algorithm.
This paper proposes an implementation of a BDD package [16] K. Gulati, S. Khatri. “Towards acceleration of fault simulation
which uses the GPU hardware for the acceleration of certain using graphics processing units”, in Proc. 45th ACM/IEEE
data-parallel operations. The proposed implementation Design Automation Conference, 2008, 822-827.
exploits several sources of parallelism that exist within BDD [17] V. Bertacco, D. Chatterjee, “High performance gate-level
simulation with GP-GPU computing”, Int. Symp. on VLSI
packages. In particular, we discuss the parallel OpenCL
Design, Automation and Test, 2011, 1-3.
implementation of the lookup_insert hash operation, which is [18] D. Chatterjee, V. Bertacco, "EQUIPE: parallel equivalence
of central importance to the BDD algorithm component, and a checking with GP-GPUs", IEEE Int. Conference on Computer
GPU-accelerated garbage collection component. The Design, 2010, 486-493.
experimental results confirm that the application of the [19] D. Gajić, R. Stanković, "GPU accelerated computation of fast
proposed implementation, which distributes the BDD package spectral transforms", Facta Universitatis - Series: Electronics
operations over the CPU and the GPU, leads to significant and Energetics, vol. 24, no. 3, University of Niš, Serbia, 2011,
computational speedups. The results presented in the paper 483-499.
may also be helpful in the general study on improvement of [20] D. Gajić, R. Stanković, M. Radmanović, “Implementation of
dyadic correlation and autocorrelation on graphics processors”,
BDD packages. Since these first research results look
Int. J. Reasoning-based Intelligent Systems (IJRIS), vol. 4, nos.
promising, further work on this topic will be devoted to the 1/2, Inderscience, Geneva, Switzerland, 2012, 82-90.
extension of the GPU acceleration method to the [21] B. Yang, "Optimizing model checking based on BDD
implementation of other operations that are common in the characterization", PhD Dissertation, Carnegie Mellon University
components of BDD packages. Pittsburgh, USA, 1999.
[22] B. Yang et al., “A study of BDD performance in model
checking”, in Proc. Formal Methods in CAD, 1998, 255-289.
REFERENCES [23] R. Rudell, “Dynamic variable ordering for ordered binary
decision diagrams”, in Proc. Int. Conf. on Computer-Aided
[1] K. Brace, R. Rudell, R. Bryant, "Efficient implementation of a Design, 1993, 139–144.
BDD package", in Proc. Design Automation Conf., 1990, 40-45. [24] N. Klarlund, T. Rauhe, "BDD algorithms and cache misses",
[2] J. Sangavi, R. Ranjan, R. Bryton, A. Sangiovanni-Vincentelli, BRICS Report Series RS-96-5, Department of Computer
"High performance BDD package based on exploiting memory Science, University of Aarhus, 1996.
hierarchy", in Proc. of the Design Automation Conf., 1996. [25] T. Aamodt, “Architecting graphics processors for non-graphics
[3] D. Long, “The design of cache-friendly BDD library“, in Proc. compute acceleration’, in Proc. IEEE PACRIM Conf., 2009,
1998 IEEE/ACM Intl. Conf. on CAD, 1998, 639 - 645. 963-968.
[4] G. Janssen, “Design of pointerless BDD package“, 10th Int. [26] S. Ryoo, et al., “Optimization principles and application
Workshop on Logic&Synthesis, Lake Tahoe, USA, 2001. performance evaluation of a multithreaded GPU using CUDA”,
[5] R. Ebendt, F. Gorschwin, R. Drechsler, Advanced BDD in Proc. 13th ACM SIGPLAN Symp. on Principles and Practice
Minimization, Springer, New York, 2005. of Parallel Programming, 2008, 73–82.
[6] G. Janssen, “A consumer report on BDD packages“, in Proc. [27] J. Owens, M. Houston, D. Luebke, S. Green, J. Stone, and J.
16th Symp. Integrated Circuits and Systems Design, 2003, 217- Phillips, “GPU computing”, Proc. of the IEEE, vol. 96, no. 5,
223. 2008, 279–299.
[7] F. Somenzi, “Efficient manipulation of decision diagrams,” Int. [28] B. Gaster et al., Heterogeneous Computing with OpenCL,
J. Software Tools for Technology Transfer (STTT), vol. 3, no. 2, Elsevier, 2011.
2001, 171-181. [29] R. Rudell, Espresso Misc. Reference Manual Pages,
[8] M. Sentovich, "A brief study of BDD package performance", in http://embedded.eecs.berkeley.edu/pubs/downloads/espresso/ind
Proc. of the Formal Methods on CAD, 1996, 389-403. ex.html, 1993.
219
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
220
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
GIS. Like all modern distributed GIS architectures, proposed system is GIS framework – a set of C++ class libraries
solution architecture relies on a client/server model. developed in Laboratory for Computer Graphics and GIS
Communication between server side subsystems is depicted (CG&GIS Lab), on Faculty of Electronic Engineering in Niš.
by the component UML diagram shown in Fig. 1. The GIS framework implements common data model and most of
responsibility of Desktop GIS component, in the server side of the functionalities. Desktop GIS application and GIS Server
the system, is creation and preparation of a content that can be system service can be seen as a kind of an interface toward
distributed via GIS Server. GIS Server implements OGC them. The main advantage of sharing the same core between
WMS, WFS and WCS services in order to distribute these two subsystems is in maintainability. When some new
geospatial data and functions to its clients. For preparation of feature (or change) is added to the framework (e.g. support for
geospatial content, Desktop GIS relies on use of a project file. new data format) it automatically becomes present in both
The project file is an XML document that contains Desktop GIS application and GIS Server. A simplified
specification of all coordinate systems, geodata services, overview of the implementation architecture of GIS
coverage data, layers, and styles that are used for geospatial framework along with Desktop GIS and GIS Server is shown
and coverage data organizing and presentation. While in Fig. 3. There are two packages (Visual C++ projects)
Desktop GIS allows creation and manipulation of GIS responsible for production of executable components of
projects, GIS Server only use previously prepared projects for Desktop GIS application and GIS Server system service,
geospatial content distribution. while the other packages (i.e. projects) represents previous
Component UML diagram in Fig. 2 shows client side introduced GIS framework.
subsystems of proposed GIS solution. Mobile GIS and Web
GIS rely on web interfaces provided by the GIS Server
(WMS, WFS and WCS) in order to provide their own <<EXE>> <<EXE>>
Desktop GIS application
functionalities. Desktop GIS also has the ability of utilizing GIS Server system service
Desktop GIS
<<LIB>> <<LIB>>
<<artifact>>
Proj4 GDAL
Geospatial Data
Project File
Fig. 1. Server side subsystems The GIS framework is implemented with support of four
open source libraries: Proj4, GDAL, GEOS, and ADO. Proj4
[9] is a library that implements mechanism for definition of
WMS WFS
various coordinate reference systems (i.e. projections) and
WCS
reprojection of coordinates between them. GDAL [10] is a
library for raster geospatial data formats management, while
Desktop GIS Mobile GIS GEOS [11] library enables support for spatial querying and
Web GIS
geoprocessing. Finally, ADO [12] library contains a set of
classes that simplifies database accessing and management.
The majority of the framework implementation (e.g. data
model) is contained within GIS dynamic library classes, while
Fig. 2. Client side subsystems XML is only helper library for accessing, managing, and
creating XML documents. Since Desktop GIS and GIS Server
share the same implementation framework, both of them are
III. DESKTOP GIS AND GIS SERVER tied to the same platform. In our development we relied on
Microsoft Visual C++ 2008 and Microsoft Foundation Classes
The described relation between Desktop GIS and GIS (MFC). As a result, current Desktop GIS and GIS Server
Server implies tightly coupled implementation of these two platform is limited to Microsoft Windows and Microsoft
components. Core of Desktop GIS application and GIS Server Windows Server series of operating systems.
221
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
IV. CLIENT SIDE SUBSYSTEMS meteorological data application requires different user profiles
that differ in:
As we already stated, client side of the proposed GIS • Education level,
solution includes Web GIS, Mobile GIS and Desktop GIS. • Responsibility for decision making,
Web GIS and Mobile GIS completely depend on services and • Working environments,
geospatial data supplied by GIS Server. Desktop GIS has the • Experience with GIS tools, etc.
capability of utilizing web interfaces provided by the GIS For all numbered reasons, using single platform solution
Server, but also has other responsibilities and functionalities, (one GIS application) can be inappropriate for wider user
as described in section 3. audience. In order to analyze the use of proposed GIS
Web GIS’s primarily use is geospatial data visualization subsystems, we should identify several typical GIS user
and querying. GIS Server’s WMS service is used for retrieval profiles of meteorological data application in general:
of custom maps in form of raster images. WFS service enables • Meteorological data analyzers
query execution and results retrieval in form of GML [13] • Decision makers
encoded geographic features. WCS service enables coverage • Simple viewers
data retrieval for defined spatial and temporal constraints. The • Users involved in “on field” operational tasks, and
implementation of Web GIS heavily relies on OpenLayers • Applications administrators.
[14], open source JavaScript library developed by the Open Meteorological data analyzers are the most complex group
Source Geospatial Foundation. The implementation of Web of users that includes experts in particular meteorological (or
GIS is based on several web technologies such as: PHP, some related) domain which are also specialized for GIS tools
JavaScript, AJAX, and .NET. use. For that reason, powerful Desktop GIS applications are
Mobile GIS has similar background architecture, i.e. it also what this spectrum of users needs. Furthermore, these users
use WMS, WFS and WCS services of GIS Server, but the often need specialized tools for geospatial and meteorological
implementation and intended use is quite different. As it is data analysis. Our solution includes development and delivery
intended to run on hand-held devices, as “on field” tool for of such specialized tools within Desktop GIS. These tools are
data acquisition and situation awareness, the platform of developed as plugins – DLLs that conform to a predefined
choice was Microsoft Windows Mobile. Mobile GIS interface used for interaction with the application and
subsystem is implemented using C# programming language underlying geospatial data. When present, a plugin is
and .NET Compact Framework. Unlike Web GIS that drives automatically loaded into Desktop GIS application and can be
huge support form OpenLayers library, Mobile GIS’s accessed from appropriate menu item. A sample screen shoot
communication with WMS, WFS and WCS services is of Desktop GIS application is shown in Fig. 4.
implemented from scratch. Since Mobile GIS, besides map
visualization and coverage data querying, also deals with
geospatial data acquisition, GIS Server’s WFS service has to
be extended with transactional part of the specification.
Transactional WFS, in addition to querying, allows
manipulation of geographic features using insert, update and
delete operations.
As previously stated, Desktop GIS is able to use web
interfaces provided by GIS Server: WMS, Transactional WFS
and WCS. Classes that implement communication between
Desktop GIS and above listed web interfaces are contained
within GIS library (Fig. 3). Since Desktop GIS and GIS
Server share the same GIS framework, GIS Server can also
act as a client of some other GIS server, thus enabling the
creation of cascade connection between servers. Being the
most powerful platform of the three, Desktop GIS provides Fig. 4. Screen shot of Desktop GIS application
additional functionalities which are not implemented in Web Decision makers are users that have authority to make
GIS and Mobile GIS: various tools for WCS coverage data decisions (e.g. hail suppression activity initiation, aviation
analysis and flexible style management for visual flight plan regulation, taking appropriate actions in
representation of WCS coverage data, WMS raster images and agriculture, military etc.). Although usually experts in
WFS geographic features. particular domain, decision makers are characterized as casual
GIS users. Their primarily tasks are not GIS related, i.e. they
V. CASE STUDY (can) only use GIS as another information source for decision
making. More often, decision making must by fast, so this
Using GIS in meteorological domain involves variety of category of users must be quickly presented with the exact as
different user needs and profiles. Meteorological data possible information they need. By our opinion, simplified
applications are vastly diverse: weather forecast, hail applications with easy-to-use user interfaces, along with
suppression, climate change monitoring, aviation, agriculture, adequate geospatial and meteorological data content are what
military etc. From the GIS user perspective, each decision makers need. Client side subsystems, primarily Web
222
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
GIS and Mobile GIS applications, are what we see as the most Server is only part of the responsibilities and functionalities of
appropriate solution for this category. A sample screen shots Desktop GIS. Primary use of Web GIS is geospatial data
of Web GIS and Mobile GIS are shown in Fig. 5. visualization and querying, and it is intended for broader
The third group, simple viewers, includes broader audience spectrum of less specialized users. Mobile GIS, as it runs on
of generally non-specialized people interested in some aspect hand-held devices, is basically intended for “on field” data
of particular meteorological domain (e.g. weather forecast). acquisition and situation awareness. As the most powerful
Web GIS is the most suitable tool for this user group. client side subsystem that provides various specialized
Many meteorological applications include “on field” analysis tools along with basic GIS functionalities, Desktop
operational tasks. In terms of GIS functions we recognized GIS is primarily indented for specialized users.
two major categories: simple meteorological data collecting
and support for enhanced situation awareness. On field
operations, regarding the environment, require specialized
ACKNOWLEDGEMENT
computing hardware and the running software. Mobile GIS, as
the proposed tools of choice, basically satisfies listed Research presented in this paper is funded by Ministry of
requirements for this user group. Education and Science, Republic of Serbia as part of the
Finally, the last identified category of GIS users is involved project “Environmental Protection and Climate Change
in applications administration. The personnel appointed to Monitoring and Adaptation”, Nr. III-43007.
these tasks must be well educated and especially trained to
support maintenance of the proposed GIS system. Although REFERENCES
they directly do not use any of the presented subsystems they
must have good knowledge of all of them. [1] Worboys, M., Duckham, M., GIS: A Computing Perspective.
Second Edition. CRC Press, Boca Raton, FL, 2004.
[2] Chang, K., Introduction to Geographic Information Systems,
Third Edition. McGraw-Hill, New York, NY, 2005.
[3] Wong, S. H., Swartz, S. L., Sarkar, D., “A Middleware
Architecture for Open and Interoperable GISs”, IEEE
MultiMedia, 9(2)(2002) pp. 62-76.
[4] Shekhar, S., Vatsavai, R. R., Sahay, N., Lime, S., “WMS and
GML based Interoperable Web Mapping System”, Proceedings
of the 9th ACM international symposium on Advances in
geographic information systems, Atlanta, Georgia, USA, 2001,
pp. 106-111.
[5] Milosavljević, A., Đorđević-Kajan, S., Stoimenov, L., “An
Application Framework for Rapid Development of Web based
Fig. 5. Screen shot of Web GIS (left) and Mobile GIS (right) GIS: GinisWeb”, in: J.T. Sample, K. Shaw, S. Tu, M.
Abdelguerfim eds. Geospatial Services and Applications for the
Internet, Springer, New York, 2008, pp. 49–72.
[6] La Beaujardière, J. ed., Web Map Service Implementation
VI. CONCLUSION Specification (Ver. 1.1.1), document 01-068r3, Open Geospatial
Consortium Inc., 2002,
Great diversity of meteorological data applications implies http://www.opengeospatial.org/standards/wms.
large spectrum of potential GIS users. In this paper we [7] Vretanos, P. A., ed., Web Feature Service Implementation
focused on two main issues. Firstly, we presented distributed Specification (Ver. 1.0.0), document 02-058, Open Geospatial
multiplatform architecture of GIS applicable in Consortium Inc., 2002,
meteorological applications that consists of four subsystems: http://www.opengeospatial.org/standards/wfs.
Desktop GIS, GIS Server, Web GIS and Mobile GIS. Second [8] Whiteside, A., Evans, J. D., ed., Web Coverage Service (WCS),
Implementation Specification (Ver. 1.1.0.), document 06-083r8,
issue was identifying subsystem roles and possible use case Open Geospatial Consortium Inc., 2006,
scenarios that can generally be applied for all meteorological http://www.opengeospatial.org/standards/wcs.
data applications. [9] PROJ.4 – Cartographic Projections Library,
Proposed GIS solution architecture relies on a client/server http://proj.osgeo.org.
model. Server side subsystems are GIS Server and Desktop [10] GDAL – Geospatial Data Abstraction Library,
GIS. In this context, the main role of Desktop GIS application http://www.gdal.org.
is content preparation in terms of data acquisition and [11] GEOS – Geometry Engine, Open Source,
processing. In order to distribute prepared data, we rely on http://trac.osgeo.org/geos.
well-known concept of project file. Once the project file and [12] Antollini, C., "A set of ADO classes - version 2.20", The Code
Project, 6 Sep 2005,
corresponding geospatial data are prepared, they can be shared http://www.codeproject.com/KB/database/caaadoclass1.aspx.
using WMS, WFS and WCS services of GIS Server [13] Cox, S., Cuthbert, A., Lake, R., Martell, R. eds., OpenGIS
subsystem. Client side subsystems are Web GIS, Mobile GIS Geography Markup Language Implementation Specification
and Desktop GIS. Web GIS and Mobile GIS completely (Ver. 2.1.2), document 02-069, Open Geospatial Consortium,
depend on services and geospatial data supplied by GIS 2002, http://www.opengeospatial.org/standards/gml.
Server, while utilization of web interfaces provided by GIS [14] OpenLayers – Free Maps for the Web,
http://www.openlayers.org.
223
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
1
Marieta Kovacheva is with the Faculty of Electronics at II. PRINCIPLE OF TRACKING CONVERTERS
Technical University of Sofia, 8 Kl. Ohridski Blvd, Sofia 1000,
Bulgaria, E-mail: m_kovacheva@tu-sofia.bg. OPERATION
2
Ivailo Pandiev is with the Faculty of Electronics at Technical The counting method requires the least circuit complexity,
University of Sofia, 8 Kl. Ohridski Blvd, Sofia 1000, Bulgaria.E-
but the conversion time is considerably longer than with the
mail: ipandiev@tu-sofia.bg.
224
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
other methods – generally between 1ms and 1s. This is a great III. MODELLING OF TRACKING ADC WITH VHDL-
plus for slowly changing signals. The counting method can be AMS
implemented in various ways; one of them is the tracking
conversion. The basic structure of tracking ADC is given on
The created behavioural model of tracking ADC is
Fig. 1.
K2
developed by using a style combining structural and
− 0,5U LSB
mathematical description. The structural description is the
G3
+ netlist of the model and the behavioural description consists of
Uin Σ ≥1 eoc
−
CLK simultaneous statements to describe the continuous behaviour.
+ 0,5U LSB The behaviour of the proposed ADC is strictly described using
K1
G1 & & G2 basic structure given on Fig. 1.
dout dout
U _ out
DAC
up/down C+
counter C−
A. A behavioural language: VHDL-AMS
U _ ref dout
225
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
library IEEE; library ieee_proposed; Furthermore, the model has two inner terminals: sum_out and
use IEEE.std_logic_1164.all; use IEEE.std_logic_arith.all; use IEEE.math_real.all;
use ieee.std_logic_unsigned.all; use ieee_proposed.electrical_systems.all;
dac_out. They are used to specify the voltages vsum and
v_out respectively. Also six inner signals are defined: out
entity tracking_adc_12_bits is _plus, out_minus – outputs of K1 and K 2 ; clk _up, clk_down –
generic ( Nbits : integer := 12; ‐‐ number of bits of ADC's output summing and subtracting inputs of counter; s_out – DAC
v_ref : voltage := 5.12); ‐‐ ADC's reference voltage output and synch – internal synchronization of the clock signal.
The architecture is subdivided into four main parts
port ( terminal ain : electrical; ‐‐ADC's analog input terminal
signal clk, stop : in std_logic; ‐‐ Strobe clock and stop signal according to the functions of the different elements in basic
signal dout : out std_logic_vector (0 to 11);‐‐ Digital output structure: (1) up/down counter, (2) DAC, (3) subtractor and
signal eoc : out std_logic ); ‐‐ equilibrium signal (4) window comparator with additional logic element, gene-
end entity tracking_adc_12_bits; rating eoc signal.
The output value of the converter is formed by the formula:
architecture default of tracking_adc_12_bits is
VI V V
signal out_plus, out_minus: std_logic; ‐‐ output of comparators Z= = 2 n I = Z max I (1)
signal clk_up, clk_down: std_logic; ‐‐ up and down input of the counter VLSB Vref Vref
signal s_out: real := 0.0; ‐‐ output of dac
signal synch : std_logic; ‐‐ internal synchronization of clock signal where Z is the output digital value, V I is input analogue
terminal sum_out: electrical; ‐‐ sum of input signal and dac signal
terminal dac_out : electrical; ‐‐ dac output voltage, V LSB = V ref / 2 n is the least significant bit voltage
quantity v_out across i_out through dac_out to electrical_ref;
quantity vin across ain to electrical_ref; and is equal to division of reference voltage by 2 n bits, n is
quantity vsum across isum through sum_out to electrical_ref;
quantity vctrl_pos, vctrl_neg : voltage;
the number of bits, and Z max - is the maximum possible
digital value.
begin
The schematic representation of the symbol confirm to the
vctrl_pos == 0.5*(v_ref/2.0**Nbits); ‐‐ upper reference voltage description of Fig. 3 is given on Fig. 4. The generated model
vctrl_neg == ‐0.5*(v_ref/2.0**Nbits); ‐‐ lower reference voltage has a total number of five ports: ain – input terminal, clk–
process(Vin'above(vctrl_pos), Vin'above(vctrl_neg), clk_up, clk_down, synch)
clock signal, stop - stop signal, eoc – end of conversion signal,
dout1[0:11] – output logic vector with length of 12 signals.
variable counter : std_logic_vector (0 to 11):="000000000000"; ‐‐ init of the counter Number of bits in the model can be changed with define a
variable sum : natural;
new value for the parameter Nbits, the signal dout and the
begin variable counter. After the change a generation of new symbol
is needed.
if rising_edge(clk_up) and clk_down = '0' then ‐‐ define work mode of counter
counter := counter + '1';
elsif rising_edge(clk_down) and clk_up = '0' then
counter := counter ‐ '1';
end if;
dout <= counter;
sum := 0;
226
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
90 o 1 0 113510 010
V. CONCLUSION
In this paper a generalized behavioural VHDL-AMS model
of tracking 12-bit ADC has been presented. The model is
implemented and the structure of its description confirm to the
format of the simulation program SystemVision 5.5. The
proposed model accurately simulates the actual performance
of typical tracking ADC. The efficiency of the model was
proved by comparison of the simulation results with
theoretically calculations for piecewise linear input voltages.
Furthermore, the workability of the model was shown by
simulation testing of a schematic of a resolver to digital
Fig. 6. Simulation results for four values of the input voltage. converter. The simulations were performed for several values
The schematic on Fig. 7. includes rotor, primary and of the shaft angles of the rotor. The obtained results confirm
secondary windings on the stator and two ADCs. The stator to the theoretically calculated parameters.
windings are displaced mechanically by 90 o . The primary
winding is excited with an ac reference. The amplitude of ACKNOWLEDGEMENT
subsequent coupling onto the stator secondary windings is a
function of the position of the rotor (shaft) relative to the This paper is part of a project, which is sponsored by the
stator. The resolver, therefore, produces two output voltages research program of the TU-Sofia, Bulgaria.
(S3 − S1, S2 − S4) modulated by the sine and cosine of shaft
angle. These output voltages are passed to two ADCs. The
ADCs track the change in the rotor position and their digital
REFERENCES
outputs respond to the respective analogue value. The
[1] G. Mihov. Digital Electronics, Sofia, Technical Univerity –
SystemVision libraries do not include a model of step motor. Sofia, 2005 (in Bulgarian).
To realize this structure is used an ac source modelled [2] M. Seifart. Analoge Schaltungen. 6 Auflage. Verlag Technik
vpsin(ωt) and two dc sources modelled sin(θ) and cos(θ). The Berlin, 2003 (in German).
dc sources present the sine and cosine of the corresponding [3] T. Floyd. Digital fundamentals, 10th edition, Prentice-Hall,
angle. Each of the dc sources is multiplied with ac source in 2009.
order to form output voltages relevant to the stator ones. The [4] V. Tietze, Ch. Schenk. Electronic circuits. 2nd Edition. Berlin,
Heidelberg, New York. Springer-Verlag, 2008.
simulation is made for six values of the angle − 15 o , 30 o , 45 o ,
[5] PSpice A/D library list, Release 9.2, Cadence Design Systems,
60 o , 75 o and 90 o . The ac source is with amplitude V p equal 2000.
[6] System Vision mixed-signal model library (ver. 5.5), Mentor
to 1V , dc offset voltage 1,5V and frequency 2kHz . The Graphics, 2007.
simulation results are given in Table 2. As you can see the [7] Matlab Simulink release 2011b libraries, The Mathworks,
results confirm to the calculated parameters. 2011.
[8] E. Peralias, A.J. Acosta, A. Rueda, J. Huerdas. VHDL-based
behavioural description of pipeline ADC, Measurement, vol.
31,pp. 47-60, 2002.
[9] M. Rizzi, B. Castagnolo. Efficiency in simulations tools in
designing sigma-delta ADC. AEU - International Journal of
Electronics and Communications, vol. 60, pp. 290-298, 2006.
[10] M. Kovacheva, I. Pandiev. Behavioural VHDL-AMS model for
half-flash analog-to digital converter. Annual journal of
electronics, vol. 5, No 1, pp. 39-42, 2011.
Fig. 7. Schematic of resolver to digital converter.
227
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
I. INTRODUCTION
Fig. 1. Parameterized model of a single solar cell.
The design and optimization of photovoltaic systems
require development of computer models of PV cells and A generic symbol for the PV cell model is shown in Fig. 2.
panels. These models are of significant importance for the
simulation of maximum power point tracking (MPPT) control
systems and allow the investigation and optimization of the
dynamics of PV power systems.
Photovoltaic models of PV cells and modules are developed
Fig. 2. Generic symbol of PV cell.
in [1-3]. Methods for parameter extraction and simulation of
photovoltaic modules by taking the manufacturer specified B. Model of PV panel
data are developed in [4-6]. A sun-tracking system based on
the Verilog HDL and using an FPGA chip as controlling The model of PV panel uses the same schematic
platform is proposed in [7]. Combining all analog and digital representation as the single PV cell shown in Fig. 1, but with
blocks of a project, using a behavior HDL like Verilog-AMS scaled parameters to represent a whole panel. A panel consists
and VHDL-AMS [9] allow the entire project to be simulated of NP modules connected in parallel, where each module has
and verified as a whole. A SoC design of solar irrigation NS cells connected in series, as shown in Fig. 3.
control system based on FPGA is offered in [8].
Parameterized Verilog-AMS macromodel is created in the
present paper that can represent a single PV cell, as well as an
entire panel consisting of PV cells connected in series and
parallel. An additional model using a simplified version of the
diode is also described. Definitions for obtaining the model
characteristics from the simulation results are provided,
according to the pattern file syntax used by SMASH [10].
228
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
A. Verilog-AMS code of PV panel with full diode description IV. SIMULATED CHARACTERISTICS IN DOLPHIN
INTEGRATION SMASH
The Verilog-AMS implementation of the model has the
following form: The characteristics for the Verilog-AMS model of PV
module pv_cell_01_vams(n1, n2); panel with full diode description are obtained for a single cell
inout n1, n2;
electrical n1, n2, n3; using DC sweep as the primary simulation analysis. To
parameter real Icc= 4.0; determine the dependence on RS, RSH, KSH and temperature, the
parameter real Ksh= 1.0; following parametric sweeps are run together with the primary
parameter real Rs = 1.0m; analysis: RS: value list: 0.1m, 1m, 10m, 100m; RSH: value list: 1,
parameter real Rsh=100.0; 10, 100; KSH: linear from 0.25 to 1, with a step size of 0.25 and
parameter real Ns = 1.0;
parameter real Np = 1.0; TEMPER: linear from 0 to 75, with a step size of 25. The
parameter real Is = 1.0u; remaining model parameters are given in Fig. 4.
parameter real N = 1.5; The current and power characteristics are obtained using
analog begin the waveforms I(V1) and IN(V1.POWER). The following
I(n3, n1)<+ V(n3, n1)*Np/Rsh - Icc*Ksh*Np;
I(n3, n2)<+ V(n3, n2)*Np/(Ns*Rs); characteristics are also obtained from the simulation results:
end current and voltage at the maximum power point IPP and VPP,
diode_pv_sp #(.Is(Is*Np), .N(N*Ns)) fill factor FF, maximum power PMAX, short circuit current ISC,
D_pv (.n2(n3), .n1(n1)); and open circuit voltage VOC. The parameter FF is defined as
endmodule
follows:
The block has two electrical terminals, n2 is the positive one
and n1 is the negative. The model parameters are defined. The PMAX
FF , (1)
elements I1, R1 and R2 are modeled by their component PT
equations. A diode block is added between nodes n3 and n1, to
model the non-linear behavior. where: PMAX max P , (2)
SMASH is a mixed language simulator and allows
subcircuits defined using the Spice language syntax to be PT I SCVOC . (3)
added to Verilog-AMS nets and vice versa. The diode_pv_sp The definitions for obtaining PMAX, ISC, VOC, PT, FF, VPP,
block wraps a Spice diode model inside a subcircuit, using the and IPP from the simulation results are created using the
following Spice description: .MEASURE command according to the pattern file syntax
.SUBCKT diode_pv_sp n1 n2 PARAMS: Is=1 N=1 used by SMASH:
.MODEL diode_pv D (Is=Is N=N)
D1 n2 n1 diode_pv .MEASURE ANALYSIS=DC NAME=Pmax
.ENDS + WAVEFORM=IN(V1.POWER) EXTRACT=MAX
.MEASURE ANALYSIS=DC NAME=Isc
B. Model of PV panel with simplified diode description + WAVEFORM=I(V1) EXTRACT=MAX
.MEASURE ANALYSIS=DC NAME=Voc
+ WAVEFORM=I(V1) EXTRACT=X ATY=0
For the purpose of simulating PV cells behavior, the diode + CROSS=DOWN OCCUR=1
is only used in forward direction. Additional effects like .MEASURE ANALYSIS=DC NAME=PT VALUE={Isc*Voc}
junction capacitance can also be omitted. Hence it is possible .MEASURE ANALYSIS=DC NAME=FF VALUE={Pmax/PT}
to simplify the model of PV panel with Spice diode, by .MEASURE ANALYSIS=DC NAME=Vpp
+ WAVEFORM=IN(V1.POWER) EXTRACT=ATMAX ATY=0
replacing the diode with its equivalent equation. The model is .MEASURE ANALYSIS=DC NAME=Ipp
described by the following Verilog-AMS code: + WAVEFORM=I(V1) EXTRACT=Y ATX=Vpp
module pv_cell_02_vams(n1, n2); The current and power characteristics as a function of RS
inout n1, n2; are shown in Fig. 5.
electrical n1, n2, n3;
parameter real Icc = 4.0 from (0:inf); 200m 400m 600m
parameter real Ksh = 1.0 from [0:1]; I(V1) 4A
parameter real Rs = 1.0m from (0:inf); 0.1m
3A
parameter real Rsh = 100.0 from (0:inf); Rs=100m 10m 1m
parameter real Ns = 1.0 from [1:inf); 2A
parameter real Np = 1.0 from [1:inf); 1A
parameter real Is = 1.0u from (0:inf);
parameter real N = 1.5 from (0:inf); W(V1) 0.1m
parameter real Tn = 300.15 from (0:inf); 2
1m
parameter real XTI = 3.0 from (0:inf); 10m
1.5
parameter real Eg = 1.11 from (0:inf); 1
analog begin 500m
I(n3, n1) <+ V(n3, n1)*Np/Rsh - Icc*Ksh*Np Rs=100m
+ Np*Is*(exp(V(n3, n1)/(Ns*N*$vt))-1)
* exp(($temperature/Tn-1)*Eg/(Ns*N*$vt)) Fig. 5. Current and power characteristics as a function of RS: I(V1,RS)
* pow($temperature/Tn, XTI/(Ns*N)); and P(V1,RS).
229
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
are shown in Fig. 7. High values for the shunt resistance have 3.4
Fig. 7. Current and power characteristics as a function of RSH: Fig. 10. IPP, VPP and FF characteristics as a function of KSH:
I(V1,RSH) and P(V1,RSH). IPP(KSH); VPP(KSH) and FF(KSH).
230
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
20 40 60
IPP 3.76 REFERENCES
3.72
3.68 [1] H-L., Tsai, Ci-Siang Tu, and Yi-Jie Su. “Development of
3.64
generalized photovoltaic model using MATLAB/SIMULINK”,
3.6
Proceedings of the World Congress on Engineering and
3.56
VPP
Computer Science 2008, WCECS 2008, October 22 - 24, San
520m Francisco, USA, 2008.
480m [2] I.H., Altas, A.M., Sharaf. “A photovoltaic array simulation
440m
model for Matlab-Simulink GUI environment”, International
Conference on Clean Electrical Power,. ICCEP '07. 21-23 May
400m
2007,pp. 341 – 345, Capri, 2007.
FF
780m [3] Hernanz, R., C. Martín, J.J. Belver, L. Lesaka, Z. Guerrero, E.
760m Puelles Pérez.”Modelling of photovoltaic module”, International
740m
Conference on Renewable Energies and Power Quality,
720m
(ICREPQ’10) Granada (Spain), 23th to 25th March, 2010.
[4] D. Sera, R. Teodorescu, P. Rodriguez. “PV panel model based
on datasheet values”, IEEE International Symposium on
Fig. 12. IPP, VPP and FF characteristics as a function of the Industrial Electronics, ISIE 2007,June 4-7 2007, Vigo, Spain,
temperature: IPP(T); VPP(T) and FF(T). ISBN: 978-1-4244-0754-5, pp. 2392-2396, 2007.
[5] G. Farivar and B. Asaei. “Photovoltaic module single diode
The current characteristics match for all of the simulated model parameters extraction based on manufacturer datasheet
temperatures. The relative difference is smaller than 2×10-6 %, parameters”, IEEE International Conference on Power and
hence it is advisable to use the simplified model in order to Energy, PECon 2010Nov. 29-Dec. 1 2010, Selangor, Malaysia,
speed the simulation of large circuits, as the accuracy is not ISBN: 978-1-4244-8947-3, pp. 929-934, 2010.
sacrificed. [6] N.N.B. Ulapane, C.H. Dhanapala, S.M. Wickramasinghe, S.G.
Abeyratne, N. Rathnayake and P.J. Binduhewa. “Extraction of
parameters for simulating photovoltaic panels”, 2011 IEEE 6th
V. CONCLUSIONS International Conference on Industrial and Information Systems
(ICIIS), 16-19 Aug. 2011, Peradeniya, Sri Lanka, ISBN: 978-1-
A behavioral parameterized Verilog-AMS macromodel has 4577-0032-3, pp. 539-544, 2011.
been developed for PV cell and PV panel consisting of cells [7] Cheng Sen, Zhao Ping, He Hongkun, Ji Qianqian and Wei Xu.
connected in series and in parallel. The model of PV panel can “An improved design of photo-voltaic solar tracking system
also represent a single cell. The detailed model relays on a based on FPGA”, AICI'10, International Conference on
Spice diode model to describe the non-linear behavior of the Artificial Intelligence and Computational Intelligence, 23-24
October 2010, Sanya, China, ISBN: 978-1-4244-8432-4, pp.
PV cell. An alternative simplified model is also provided. It 267-271. 2010.
includes only the diode equations that are important for the [8] Ze Cheng, Dan Zhong, Baolin Li and Yanli Liu. “The SoC
modeling of the PV behavior. It is a pure Verilog-AMS design and realization of small scale solar irrigation control
implementation, and does not depend on mixed language system based on FPGA”, 2011 International Conference on
simulators. Both models are simulated in the Dolphin Electric Information and Control Engineering (ICEICE), Apr.
Integration SMASH environment. The basic PV 15-17, 2011, Wuhan, China, ISBN: 978-1-4244-8036-4, pp.
characteristics are obtained from the simulation results. 887-890, 2011.
[9] F. Pêcheux, C. Lallement, A. Vachoux, "VHDL-AMS and
Verilog-AMS as Alternative Hardware Description Languages
ACKNOWLEDGEMENT for Efficient Modeling of Multi-Discipline Systems", Paper
#1446, IEEE, ISSN 0278-0070, 2005.
The investigations are supported by the project [10] Dolphin Integration SMASH overview,
http://www.dolphin.fr/medal/smash/smash_overview.php
№122PD0026-03.
231
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
1
Valentin Videkov, Faculty of Electronic Equipment and
Technology at Technical University of Sofia, 8 Kl. Ohridski Blvd,
Sofia 1000, Bulgaria, E-mail: videkov@tu-sofia.bg.
2
Aleksei Stratev, Extramural PhD student at Technical University
of Sofia, 8 Kl. Ohridski Blvd, Sofia 1000, Bulgaria E-mail:
astratev@ivastech.com.
3 Fig. 2 Shapes of holes in laser cut stencils
Georgi Furkov, Extramural PhD student at Technical University
of Sofia, 8 Kl. Ohridski Blvd, Sofia 1000, Bulgaria, E-mail:
georgi_farkov@festo.com
232
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
233
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
Fig. 11 3D diagram
V. CONCLUSION
This paper provides a method for destructive control over
Fig. 8 Different modes of cutting. Cuts after grinding. laser cut stencils designed for surface-mount assembly. This
method allows for a wall profile of the hole, measured in
Software has been used to process the optical image to absolute measurements, to be achieved and makes it possible
increase contrast and get sharp contour – Fig. 9. to complement the assessment of cutting parameters.
Combining profiles that have been accomplished at different
cut levels with digital presentation of those profiles allows for
creation of a 3-D digital image of the surface.
The efforts to obtain such a digital image using other
methods, like mechanical scanning through profile-measuring
device, face difficulties.
REFERENCES
[1] http://www.lc-led.com/ecommerce4.html open 2012-02.
[2] http://www.national.com/mpf/LM/LMV243.html#Overview
open .2011-12.
Fig. 9 Contrast processing of a cutting. [3] Tae-Hyoung Park at all, Path Planning of Automated Optical
Inspection Machines for PCB Assembly Systems, International
A diagram of the contour itself is easy to extract, following Journal of Control, Automation, and Systems, vol. 4, no. 1, pp.
the application of a respective processing method, where such 96-104, February 2006
a contour exists – Fig. 10. [4] Steplewski, W., at all, Stencil Design for Lead-Free Reflow
The transformation of the resultant contour into digital data Process, Electronics Technology, 30th International Spring
is not hard to realize as well. All and every cut is processed Seminar on 9-13 May 2007, ISBN: 987-1-4244-1218-1, pp. 330
using the demonstrated methodology and is transformed into - 334
[5] Stratev A., Farkov G., Videkov V., Optical Control of Laser Cut
digital data. Those may be presented graphically and may be Stencils, XLVI International Scientific Conference on
used in different types of processing. The below figure 11 Information, communication and energy systems and
shows a sample how the results derived from the wall’s technologies, Proceedings of Papers, V2, Serbia, Nish, 2011,
contours can be displayed as a 3-D diagram. ISBN 978-86-6125-3, pp. 529 – 532
234
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
235
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
11 Interharmonic voltage LV, MV: under consideration Next measurement is performed in the period from
Mains signaling 9% - 100 Hz; 1% - 100 kHz, 99% of the time 20.01.2011 to 28.01.2011 at 0,4 kV voltage level.
12
voltage in 1 day
Measurements were performed simultaneously at supply
terminal of one consumer and at the LV level of TS Crniliste
12
Psti3
20/0,4 which supplies this consumer.
Pit 3 (1)
i 1 12
B. Showing the results
40
THD U
2 After finishing the process of measurement, data is
h (2)
h2 transferred to the PS. Then, by using special software package
the summary results of measurements are obtained according
TABLE II to standard EN 50160. Because of the size of the number of
VALUES OF INDIVIDUAL HARMONIC VOLTAGES AT THE SUPPLY the data it is not possible to display all the data and charts
TERMINALS FOR ORDERS UP TO 25, GIVEN IN PERCENT OF UN provided from measurements. It will be shown only those who
are most interesting and most important for this paper.
Odd harmonics Even harmonics In the graphical results presented in additional in this paper,
Not multiples of 3 Multiples of 3 Not multiples of 3
the limit values according to standard EN50160 are marked by
Relative Relative Relative
Order h voltage Order h voltage Order h voltage violet color.
(%) (%) (%) Line voltage variations at 20 kV voltage level of TS Polog
5 6,0% 5 6,0% 5 6,0% are given in the first picture. It can be noticed that the line
7 5,0% 7 5,0% 7 5,0% voltages variations throughout the period were within the
11 3,5% 11 3,5% 11 3,5% allowable limits according EN 50160.
13 3,0% 13 3,0% 13 3,0%
On the second and the third picture are given the results for
17 2,0% 17 2,0% 17 2,0%
19 1,5% 19 1,5% 19 1,5% short interruptions of supply voltage and values of flicker
23 1,5% 23 1,5% 23 1,5% severity and total harmonic distortion factor at 20 kV level of
25 1,5% 25 1,5% 25 1,5% TS Polog 110/20 kV/kV.
It can be seen that on 10.11.2011 the THD is more than 7.5
% (very close to 8%) and there is deviation of flicker severity
III. SYSTEM ANALYZER OMNI-QUANT (Plt>1) about several hours in 26.11.2011, but still the values
of these parameters also vary within the allowable limits
The OMNI-QUANT mobile is preferably used as portable according to EN 50160.
device in changing locations. Four voltage and current As it was mentioned above that this is completely automatic
measuring inputs each one allows power measurements, fault TS with automatic voltage regulation and integrated device
analyses and recording functions along with the evaluation of for continuous control of power quality and this significantly
the voltage quality. affects to the values of all measured parameters to moving in
Complete scanning and calculation of the following values: approved limits.
• Phase voltage (L-N) and phase-to-phase voltage (L-L) In Fig. 4 and Fig. 5 are presented the results from
• Star point voltage and symmetry L1...L3 measurement of PQ at 0.4 kV voltage level of TS Crniliste.
• Frequency (identical for all channels) Similar as in the previous example (TC Polog) most of the
• Current, total current L1...L3, total current L1...L3 + N parameters are moving within the limits according to the
• Power (P, Q, S, power factor, distorted reactive power) standard EN 50160. From the shown parameters, the flicker
• Power of the fundamental (active power, reactive power, severity, the total harmonic distortion factor and the supply
apparent power, cos) voltage unbalance did not deviate from the allowable limits
• L1...L3 total of the above power variables prescribed by EN 50160 over the entire period. With the
• Harmonics 1...50th order exception on 23.01.2011 when it has a deviation of phase
• Intern harmonic of U and I up to 2.5 kHz voltages above the limits for several hours.
• Ripple control level In contrast to the values measured at 0.4 kV level of TS
• Distortion factor (THD) of V and A. Crniliste, the values measured in the same period at supply
terminal of one consumer supplied by TS Crniliste,
IV. EXAMPLES OF MEASURING THE PQ ACCORDING significantly differ. In fact, with the exception of the total
harmonic distortion factor, which moves within the allowable
TO EN 50150
limits, the other parameters significantly deviate outside the
limits. The results from this measurement are presented in Fig.
A. Measuring 6 and Fig. 7.
REFERENCES
[1] Angelo Baggini. Handbook of Power Quality. University of
Bergamo, Italy: 2008.
[2] Dr. Željko Novine. „Kvaliteta Elektrićne Enrgije“. Prirućnik.
Sveučilište J. J. Strossmayera, Osijek:2006.
[3] Љ. Николоски “Хармоници и Други Повратни Влијанија во
Електроенергетскиот Систем” Предавања на ЕТФ
Скопје:2008.
[4] EN 50160, Voltage characteristics of electricity supplied by
public distribution systems, 1999.
[5] H. Markiewicz, A. Klajn “Voltage Disturbances Standard EN
50160 - Voltage Characteristics in Public Distribution Systems”
Wroclaw University of Technology July 2004.
[6] Љ. Николовски, Г. Рафајловски, К. Најденовски, Д.
Арсеновска, Х. Хаидвогл, Ј. Зирлинген. “Технички Правила
за Проценка на Повратните Влијанија во Мрежата”, Скопје:
2010.
VI. ADDITION
237
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
Fig. 4. Flicker severity and total harmonic distortion factor at 0,4 kV Fig. 6. Flicker severity and total harmonic distortion factor at supply
level of TS Crniliste 20/0,4 kV/kV terminal of one consumer supplied by TS Crniliste
Fig. 5. Supply voltage unbalance and voltage magnitude variations at Fig. 7. Supply voltage unbalance and voltage magnitude variations at
o,4 kV level of TS Crniliste 20/0,4 kV/kV supply terminal of one consumer supplied by TS Crniliste
238
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
I. INTRODUCTION
Modern power plants are equipped with power system sta-
bilizers (PSS) for damping the electromechanical oscillations
of synchronous units. In accordance to their structure we dif-
ferentiate them as single- and dual-channel. A typical single
channel PSS with rotor speed as input signal (PSS1A) [1] is
shown in Figure 1.
Fig. 2. Block-diagram of Alstom realization of PSS2A
The input filters are tuned in such a way that they do not
pass the settled deviations of the regime parameters, and the
PSS phase-shifting blocks – to maximally damp the electro-
mechanical oscillations. The settings can be determined by a
Fig. 1. Block-diagram of PSS1A variety of different methodologies [2-4].
The purpose of this paper is to present a methodology, de-
In the electric power system (EPS) of Bulgaria mainly sin-
veloped by the authors, for single channel PSS tuning based
gle channel PSS are used, with input signal form the equiva-
on H∞ synthesis, and to discuss its advantages.
lent sum of the generator active power (Pe) and rotor speed
(ω). This equivalent input signal is obtained after the signals
of Pe and ω pass through input filters and then once again II. METHODOLOGY FOR SINGLE CHANNEL PSS
through a torsion filter which rejects the torsion oscillations
TUNING BASED ON H∞ SYNTHESIS
originating from the generator rotor. These PSS are classified
as type PSS2A and PSS2B.
The general structure of PSS2A of Alstom is shown in Fig- A. Mathematical model
ure 2. The difference between the different manufacturers’
modifications is in the number of the phase-shifting blocks For analysis of the electromechanical oscillations of the
included (and in some elements in the input filters). For ex- motors in EPS a mathematical description linearized around a
ample, in Bulgaria there are PSS2A from Alstom with certain operating point is used. The size of this mathematical
description is too big due to the great number of elements in
1
the modern united systems. Because the purpose is to tune a
Konstantin Gerasimov is a PhD student at the Department “Pow- particular PSS of a particular synchronous generator, the au-
er Engineering”, Technical University of Varna, Studentska Str. 1,
thors have developed a methodology for frequency aggrega-
Varna, 9010, Bulgaria , E-mail: kkgerasimov@tu-varna.bg
2
Petko Petkov is a Professor at the Faculty of Automation, Tech-
tion of the multidimensional EPS mathematical description in
nical University of Sofia, 8 Kl. Ohridski Blvd, Sofia 1000, Bulgaria, respect to the studied generator buses [5,6]. The descriptions
E-mail: php@tu-sofia.bg results in the following structure:
3
Krum Gerasimov is a Professor at the Department “Power Engi-
neering”, Technical University of Varna, Studentska Str. 1, Varna,
9010, Bulgaria , E-mail: k.gerasimov@tu-varna.bg
239
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
C. Algorithm
Fig. 4. Block-diagram of H∞ control design The algorithm for single channel PSS tuning consists of the
following steps:
In this form the “external” input w is the vector of all sig- 1) Formulation of the mathematical description of the
nals which come into the system and the “error” z is the vec- studied generator, as shown in Figure 3;
tor of all signals which are necessary to describe the behavior 2) Formulation of weighting functions and of transfer ma-
of the closed-loop system. P contains the plant transfer matrix trix P, as shown on the block- diagram in Figure 5;
G and weighting functions which are specific for every syn-
3) Using the constructed transfer matrix P an H∞ stabi-
thesis problem. K is being synthesized (searched) control
lizer is synthesized by means of the MATLAB® func-
function. The standard task for H∞ optimal control is to find a
tion hinfsyn;
stabilizing function K which minimizes: 4) Tuning of the fixed-structure single channel PSS in
max Fl P, K j
Figure 1 or in Figure 2 so that its frequency response is
Fl P, K
(1) as close as possible to the frequency response of the
mathematically synthesized stabilizer. This is achieved
In MATLAB® this task is solved by the hinfsyn function by searching for coincidence, of the phases or of the
from Robust Control Design® 3 toolbox. amplitudes of the frequency response in the frequency
The synthesis of control function based on signals is a range of the electromechanical oscillations, using ap-
common approach to MIMO problems for which simultane- proximating functions which solve non-linear least
ously a few different (and usually controversial) goals are square problems.
required. In this particular problem the following goals are 5) Analysis of the behavior of the tuned PSS. The step
set: and frequency response are recalculated and the ful-
- maximal damping of the electromechanical oscillations fillment of the goals, set during the synthesis, is as-
manifested in rapid damping of the rotor speed devia- sessed. If the results are unsatisfactory, first a return to
tion and the generators active power deviations. Thus step 4 is made and the structure and parameters of ap-
the generators influence over the rest of the EPS during proximation are varied. If even this cannot lead to sat-
transient processes will be minimized; isfactory results a return to step 2 is made where the
- maximal filtration of the measurement noise. Passing weight functions have to be reconsidered and from
this noise through PSS leads to high frequency oscilla- there on the process repeats.
tions in the excitation circuit and thus the other genera- 6) Construction of model with uncertainties for the pur-
tor regime parameters. It is even possible that there pose of the robust analysis. This can be done with the
may be a 50 Hz component in the noise which can re- help of the developed by the authors software tool
sult in very troublesome resonance phenomena. RobustPSS [10], allowing modeling of structured un-
certainty, presented in state space, and of unstructured
240
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
Bode Diagram
140
1
Magnitude (abs)
2
80
7) Analysis of the robust stability. It is done by means of 60
20
0
90
Phase (deg)
The proposed algorithm is tested for tuning Alstom PSS2A -90
1
of a real 370 MW synchronous generator from a Bulgarian -180
400
250
Magnitude (abs)
46.17 s 2 41.5 s 1.442 200
Wu 0.8; Ww 2
1
150
0
90
the input filters are tuned well because it is a common prac- 45 1
tice, due to subjective reasons, that it is not allowable to 0
2
Phase (deg)
-45
change the settings of the input filters. In this particular case -90
-225
T9 = 0.15 s; M = 4; N = 1. 5 10 15 (Hz)
Frequency 20 25 30
Under these conditions the H∞ synthesized controller has Fig. 7. Frequency response of: 1 – the H∞ synthesized controller
2 –PSS2A, tuned by approximation of the phase
frequency response shown in Figures 6 and 7. In Figure 6 it is
compared with PSS2A tuned by approximation of the ampli-
tude and in Figure 7 – tuned by approximation of the phase.
One should not forget that the fixed-structure PSS settings can
vary only in certain ranges. In this case T1, T3, T11, and T31 =
0 ÷ 10 s, while T2, T4, T21, and T41 = 0.015 ÷ 3 s. Due to sub-
jective reasons, the authors have chosen ks1 to vary between 5
and 20 p.u.
It is clear that in this particular case the approximation by
amplitude gives better results and this is why it will be used.
The obtained in this way settings are: ks1 = 5 p.u.;
T1 = 0.0951 s; T2 = 0.0367 s; T3 = 0.6686 s; T4 = 0.0367 s;
T11 = 0.0967 s; T21 = 0.0367 s; T31 = 0 s; T41 = 0.0664 s.
Fig. 8. Frequency response of PSS2A (1), tuned by approximation of
The gain ks1 is relatively small and we can afford to in-
the amplitude and ks1 = 9 p.u.,
crease it 1.8 times without the PSS output signal to reach the compared to the PSS output signal limitation (2)
PSS output signal limitation (see Figure 8).
0.14
In general we could fine adjust the gain ks1 because it
doesn’t affect the PSS phase compensation and exactly it is 0.12
the presented results are for ks1 = 9 p.u. and the effect can be 0.08
0
0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 5
Frequency (Hz)
241
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
IV. CONCLUSION
From: Vref
1.5
1
1
To: dU
0
-0.5
-1
2
1
1) ensure quality of the transient processes (better
-1.5
damping of the generator electromechanical oscilla-
-0.01
0
2 tions);
2) the PSS output signal doesn’t reach its limitation;
To: dw
-0.02
-0.03
-0.04 1 3) suppresses the measurement noise.
-0.05
0 1 2 3 4 5
Time (sec) 6 7 8 9 10
Fig. 10. Step response of the nominal generator model for step
change of Vref: 1 – without PSS; 2 – with PSS2A (ks1 = 9 p.u.) ACKNOWLEDGEMENT
From: Vref
0.8
1 The authors would like to express their appreciation of eng.
Venci Zahov (head of division “System analyses & Transmis-
To: dU
0.6 1
0.5
To: dP
0
-0.5 2
-1
1
0.01
REFERENCES
0
2
-0.01
To: dw
242
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
243
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
IV. CONDITION FOR HIGHER-HARMONICS The automation installed in the PV plant will allow
CURRENTS switching on the plant to the grid when all three phases in the
grid have normal operating voltages. The conditions for
The criterion of permitted content of higher-harmonics synchronized connection are voltage difference ∆UPV.<±0.1Un,
currents can be checked by applying Eq. 3 [3]: ∆.fPV.<.±0.5Hz and phase angle difference ∆ϕ.<±10% [3], [4].
244
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
The DC/AC inverter which is planed to be used is Sunny B. Check for the flickers generating
Central HE 1000MV for direct medium-voltage feed-in,
because the MV/LV transformer is build in the same house. As it was mentioned in section III., the flicker coefficient cf
Distribution feeder named “Egri” with all its elements as a should be measured in real operating steady-state conditions.
part from 10 kV grid is shown on Fig. 2. However, if the maximum possible value of this coefficient
All data for the elements connected in and between the cf =40 is taken into Eq. 2 and S3 pc =250 MVA, S nPV =1MVA,
nodes are given on the same Fig. 2. A new PV plant will be the calculated value of disturbance factor Afd.=0.0041.
connected in the node J4. In this case Afd.<<0.1, so it can be concluded that the new
Fig. 2. 10 kV feeder named “Egri” with data for the connected elements and connection point of 1 MW PV plant.
A Load-flow and short-circuit analysis for the 10 kV feeder PV plant will not generate flickers with duration more than
shown on Fig. 2 are performed with Neplan 5.0 software [9]. two hours. After construction of the PV plant the certificate
Two cases are analyzed. In the first case the new PV plant is for measured cf should be issued.
not connected and in the second case this plant is connected in
node J4. Also the calculations for checking the technical D. Check for the higher-harmonics currents
conditions which have to be fulfilled to connect this PV Plant
of 1 MW, are done. Under the normal operating conditions the total harmonic
distortion factor THD allowed by distribution company EVN
A. Check for the allowed PV plant installed power Macedonia is 8% [8]. According to the inverter manufacturer
data, this factor has value THD<3%. Taking into account
According to Eq. 1 and taking into account the values for these data, it is obvious that this condition is fulfilled and the
three phase short-circuit power (250 MVA for 10 kV grid) generated higher-harmonic currents have acceptable values.
and k.=1, the maximal allowed installed power for the PV
plant connected in node J4 can be S nPV ≤ 5 MVA. Because the E. Check for the short circuit power (current)
installed power of new PV plant is 1 MVA (actually 1 MW
because PV plants work with cosϕ.=1.0) it is obvious that The DC generator of the PV plant works as constant current
condition for maximal allowed installed power is fulfilled. source. For the planned PV modules with power of 230 Wp
The load-flow analysis confirmed that PV plant connection maximum power point current is IMPP.=7.8 A and maximum
wouldn’t change the node voltages and line currents over short circuit current is Isc.=8.3 A. Increasing of the short circuit
permitted values. In this case, the voltage drops and energy current is only 6.4% over the IMPP.. Because of the presence of
losses in the lines are smaller than in the first case. Also the the PV plant in the MV grid, the total increasing of the three
power losses in the entire grid are reduced [7]. phase short circuit current and power at the point of
245
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
246
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
1
Violina Georgieva – PhD. Student, Technical University Sofia,
III. APPLICATION OF CONTROL CARDS
Faculty of Automatics. Sofia 1000, 8 “Sv. Kliment Ohridski” Blvd.,
violina_jg@abv.bg. The quality control of the products is based on the control
2
Alexander Hadjidimitrov – ERP consultant at Team VISION of the production process itself. The documentation of the
Bulgaria Ltd. Sofia 1712, 41 “Alexander Malinov” Blvd., process is done using control cards. Thus is tracked that all
Alexander@Hadjidimitrov.com.
247
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
operations needed are done and also is tracked who are the
employees that have done the operations. This way two This control card template becomes a part of the product
important targets are achieved: specification. It is an integral part of the production
Following the sequence of operations described in documentation. It is used in the preparation of the current
the control card is guaranteed that no operations are control cards of the products during the production process.
skipped; Current control cards are filled up during the production
In case of defective product is easy to find which process. Based on the production process organization
operation has caused the defect and to trace who is different approaches are possible:
the employee who has done the operation and when
is the operation done. Thus the reasons of the defect A separate control card is filled in for each product
could be analyzed and actions to be undertaken in (for each instance).
order to change the process to avoid future problems A separate control card is filled in for each lot of
of the same type. products (e.g. for the products produced by a single
work shift).
The most important thing during the creation of a control A single control card is filled in for the total quantity
card is to define a proper list of control points. Each control produced.
point describes one operation or a group of operations that are
done in conjunction during the production process. Defining In regard of the selected approach some modifications in
the list of operations should keep in mind that operations the control cards are possible. In general it contains the
should be grouped in control points in a way that no operation following fields:
is skipped but also the list of control points should be short
enough in order to be easy to be documented and followed. ID and name of the product
It’s advisable to group related operations that are done ID of the production order
together by the same employee. As an example if during the Production date
assembly of a product 5 Integrated Circuits (ICs) should be Serial number / Lot number (or a list of numbers)
mounted in the sockets on a PCB by the same employee these A list of control points
could be grouped to one control point (“IC mounting) as For each control point – a flag that the operation is
during this operation the employee receives a PCB with the done and the ID of the employee (or a list of
sockets mounted, mounts the ICs in the sockets and employee IDs) who has done the operation. If the
afterwards transfers the ready PCB to the next stage. In other control card is for a production period longer than
case if the employee should mount only three of the ICs, a test one day – also a production date should be added to
should be carried out and afterwards the two other ICs should this list [3].
be mounted then maybe it would be better to separate the
process in 3 control points (“Mounting of the first group of
ICs”, “Test”, “Mounting of the second group of ICs”). This
IV. IMPLEMENTATION OF THE CONTROL CARDS IN
will help the process to be tracked properly in order to allow THE ERP SYSTEM
future analyses in case of defects or claims.
In order to be possible to use control cards in the production Depending on the enterprise and the software used for
process is required to prepare templates of the control cards production planning and management different approaches in
for each product (semi-finished or final) that is tracked the implementation of control cards are possible. In the case
separately (e.g. for each PCB, each cash register, etc.) Each described in the current paper an ERP system is used. The
template contains a list of control points listed chronologically functionality for control card management is implemented as
during the production process. If some operation is repeated at an additional development especially for the specific needs of
different stages during the process (e.g. testing of different the enterprise. It is integrated to the standard functionality of
modules) then it is documented as several control points at the the system for management of items (products) and
appropriate positions (one control point for each occurrence) production orders.
in the list. The control points are developed as a separate table. It
A sample template of a control card could look like: contains the full list of operations that are tracked separately.
These control points are used afterwards to assemble the
Main board test control cards of all products. The table contains the following
Recording of firmware fields:
Operator display test
Fiscal module test ID – a unique ID of the point in the system
Top cover assembly Description a description of the tracked operation
Bottom cover assembly
Display assembly The product control cards are developed as a separate table
Final product test related to the Item table (that contains the list of items in the
Final product assembly system). This way for each item is specified the list of the
Packaging control points that should be tracked. The table contains the
list of the control points that form the control card of the item.
248
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
The control points are selected from the global list of control
points in the system (the table described above.) This table
contains the following fields:
249
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
hints for the possible reasons for the defect [3]. That’s why many errors and misusage could occur. For this
reason it is very important during the implementation of this
tool to guarantee the involvement of the team who is supposed
VI. RISKS to fill and use them in order to guarantee that the information
filled is correct. Otherwise they could not pay enough
The successful usage of control cards could be attention to it and to feel it like an additional useless time-
compromised if some risks are neglected. consuming documentation that should be filled. This also will
The first risk is the improper definition of the control compromise the process.
points. As the control card is a list of the operations that
should be tracked and controlled, the proper definition of this
list is the foundation for the successful usage of control cards. VII. CONCLUSION
Possible problems include:
Skipping important operations – in case a control Control cards are a tool that allows guaranteeing of the
point is not created for an important operation than proper flow of the production process and as a result to
that operation will not be tracked by the control card. guarantee the quality in the terms of not skipping operations
As a result it could be skipped during the production due to errors. For the proper usage of the tool however it is
and also it will not be documented and future control very important the proper implementation in the organization
and analyses will be impossible. to be done and to guarantee the involvement of the team who
A very detail list of the operations – in case the is supposed to use them.
operations are not grouped in a proper way to control
points a very long list of control points might be
produced. This could make the process of filling
REFERENCES
control cards very tough and the employees to stop to
[1] G. Tsvetkov, “Production management”, Sofia, 2006,
pay attention to it. As a results they could mark
“Softrade”.
operations as “Approved” without checking their [2] I. Dakov, “Production engineering”, Sofia, 2003, “Luren”
actual status and thus to compromise the process. publishing house - “Luren commerce” Ltd.
[3] E. Andronov, M. Aleksandrova, “Operations management”,
The second big risk is the human factor. In general the „Stopanstvo”, Sofia, 2005.
control cards are created by people and are used to document
the work of people.
250
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
251
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
The maximum rate of speed change in the respective axis algorithms are presented in Fig. 2, where the symbols used
can be determined from the following equation: are: О (0, 0) – initial position; А ( S1 f , S 2 f ) – final position
( ) ( )
U sri = K рci V pri − V pfi = K рci K pfi θ ri − θ i = K sfi ω ri . (5)
form:
Fig. 2. Motion trajectories for
K рci K pfi Δθ d maxi = K sfi ω nomi . (6) two-coordinate position control:
a) Consecutive motion along the
coordinate axes;
After substituting (4) to (6) and solving with respect to the b) Simultaneous motion along
position controller coefficient, the equation becomes: the coordinate axes;
c) Combined motion along the
K sfi ω nomi 2 K sfi ε d maxi c) coordinate axes.
K рci = =
( )
. (7)
2
K pfi ω nom 2ε d maxi K pf ω nomi
i
i Fig 2b represents a trajectory obtained by simultaneous
movement along both coordinate axes. In such way of control
For the corresponding mechanical gear the linear speed and position time is:
linear position can be determined as follows:
t p = t p1 = t p2 . (10)
Vi = ωi / K gi ; S i = θ i / K gi , (8)
Fig. 2c shows a trajectory obtained at combined motion
where K gi is the respective gear coefficient. along the coordinate axes. If both drives work at the same
In general, when two-coordinate systems with position speeds, the total time of positioning is equal to the time
control are used, the motion trajectories are formed by the necessary for the drive with longer displacement time set.
respective displacements of both axes.
Motion trajectories for the studied position control t p = t p1 . (11)
252
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
253
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
Fig. 5в illustrates combined motion along the coordinate coordinate axis у is represented in Fig. 7. The set distance in
axes. this case is 0.32 m.
V. CONCLUSION
Models for computer simulation of two-coordinate electric
drive systems with various algorithms for position control
have been developed.
On the basis of computer simulations and experimental
c)
studies the presented algorithms for position control have
Fig. 5. Trajectories for different algorithms of control. been analyzed.
This research and the results obtained can be used in the
Detailed experimental studies have been carried out for design and tuning up of such two-coordinate systems of
different versions of controllers’ tuning and operation regimes. electric drives.
Some time-diagrams are presented in Fig. 6, 7 and 8.
Fig. 6 shows a linear speed trajectory, obtained REFERENCES
experimentally for displacements of 0.62 m along the
[1] M. Mikhov, Electric Drives Control Systems, Technical
coordinate axis x. University of Sofia, Sofia, 2009, ISBN 978-954-438-628-3.
[2] M. Mikhov, I. Tatarov, Analysis of a Two-Coordinate Driving
System Aiming at Performance Improvement. Bulletin of the
PGU, Vol. 61, No. 3, pp. 105-110, Ploiesti, Romania, 2009,
ISSN 1224-8495.
[3] M. Mikhov, G. Mitrinski, Analysis of Some Algorithms for
Positioning Control of Two-Coordinate Driving Systems.
Proceedings of the ICRDMI, Vol. 1, pp. 638-643, Donji
Milanovac, Serbia, 2010, ISBN 978-86-6075-017-6.
[4] G. Blažiunas, Accuracy Investigations of Multifunctional Two-
coordinate Drive System, Electronics and Electrical
Engineering, Vol. 51, No. 2, pp. 8-14, 2004, ISSN 1392 – 1215.
Fig. 6. Time-diagram of motion along the x coordinate.
[5] C. Ong, Dynamic simulation of electric machinery using
MATLAB/SIMULINK, New Jersey, Prentice Hall, 1998, ISBN
A linear speed diagram, obtained for motion along the 0-13-723785-5.
254
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
LPG4
creates challenges for long-term reliability and packaging.
LPG2
255
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
At port 2 there is an arrangement of three electrically The LabView application automatically configures
controlled 1x2 fiber optic switches that allow an arbitrary diffraction grating angle position via the precise stepper motor
access to four sensing channels, which can accommodate up and the measured channel. After the current channel is
to four LPGs depending on their bandwidth and sensitivity to measured and visualized, the program automatically
a particular physical quantity [9, 14]. At the end of each configures the next channel for measurement.
channel there is a tunable reflector which returns light back to
the sensing channel and through port 3 the light is collimated C. Correlation analysis for accuracy improvements and noise
onto a 600 lines/mm diffraction grating so the spectrum is cancellation
observed by a CCD photodiode array.
The four measured fiber-optic channels are set in the Correlation analysis in two separate spatially shifted signals
following configuration – in Ch.1 two LPG sensors are is introduced to increase accuracy of spectral measurement
placed, Ch2 and Ch.3 investigate single LPG and Ch.4 is
and to reduce signal noises. The measured broadband signals
utilized to perform reference signal measurement and system from fiber-optic sensors are spectrally resolved on the linear
calibration with the ASE light source.
CCD photodiode array. To perform a spatial shift of the signal
a precise stepper motor is implemented. It rotates the
B. Detection and control devices diffraction grating with 0.1deg accuracy.
0.5
20 0.4
0.3
10 0.2
τ 0.1
0 0.0
0 50 100 150 200 250 300 350 400 450 500
А Pixel Number, n
50
x10^3 Filtered Signal
40
Intensity, I
30
20
256
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
To filter any noise resulting from signal conversion or in The results from measurements of the transmission spectra
photodiode array and channel inequalities an averaging low- in Channel 1 are shown in Fig.5. Fig.6 presents linear change
pass filter with respect to the spatial signal shift is designed of spectrum change with two LPG sensors compared to the
(2). It averages N-shifted spectral measurements with the reference ASE broadband light source. The same results are
initial signal [7]. Since the correlation function is shown for Ch.2 and Ch.3 respectively in Fig.7-8 and Fig.9-10.
preliminarily calculated and the exact shift is acknowledged, The spectrum change in Ch.1 when sensors are under stress
the average signal is calculated and noises are filtered (bending) is presented on Fig.6, where two LPGs are
1 N simultaneously measured.
S ( n) S k (n k )
N 1 k 0 (2)
k 0 0 0
Signal w/o Force
-5 Signal with Force
By introducing this filtering scheme the acquired spectrum
LPG1 LPG2
preserves any narrow minima in measured grating sensors but -10
Loss, a (dB)
also suppresses noises due to conversion or channel ∆=2.6nm
-25 a=7.8dB
III. EXPERIMENTAL SET-UP AND L= 100mm
MEASUREMENT RESULTS -30
1480 1500 1520 1540 1560 1580 1600 1620 1640
Wavelength, (nm)
The designed multi-channel broadband spectrum
measurement system is tested by analysing four different long
period grating sensors arranged in three channels. On Ch.4 Fig. 6. Channel 1 relative measurement with LPG sensor under stress
only a tuneable reflector was connected and this channel was
utilized as reference signal. A joint multiple channel graphic
is presented on Fig.4 with relative measurement to the x10^3
ASE Reference Signal
reference signal. 40
Channel 2 - LPG3
35
Multi-channel spectra measurement 30
Intensity, I
2
Channel 1 25
-3 Channel 2 20
Channel 3
15
Losses, a (dB)
-8
10
-13
5
-18 0
0 50 100 150 200 250 300 350 400 450 500
-23 Pixel number, n
-28
1485 1505 1525 1545 1565 1585 1605 1625 1645 Fig. 7. Channel 2 LPGs’ signal compared to reference spectrum
Wavelength, (nm)
25
∆l=2nm
Intensity, I
20 -12
15
-17
10
L= 100mm
5
-22
0 1480 1500 1520 1540 1560 1580 1600 1620 1640
0 50 100 150 200 250 300 350 400 450 500 Wavelength, l (nm)
Pixel number, n
257
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
x10^3 forces on the fibers and also the ability of the demonstrated
ASE Reference Signal
40 system to detect and analyze those spectral changes.
Channel 3 - LPG4
35
30 ACKNOWLEDGEMENT
Intensity, I
25
20 The authors acknowledge the support if the Ministry of
15 Education of Bulgaria under research project VU EES 303/
10 07, the Natural Sciences and Engineering Research Council of
5 Canada, the Canada Research Chairs Program, and
0
NanoQuébec.
0 50 100 150 200 250 300 350 400 450 500
Pixel number, n
REFERENCES
Fig. 9. Channel 3 LPGs’ signal compared to reference spectrum [1] Murphy, D. F., Flavin, D. A., McBride, R., and Jones, J. D. C.,
Interferometric Interrogation of In-Fiber Bragg Grating Sensors
1 Without Mechanical Path Length Scanning, J. Lightwave
Techn., 19, 1004-1009 (2001).
-1 Signal w/o Force [2] Alves, J., Santos, J.L., Carvalho, A., and Lage, A. Fiber Bragg
-3
Sensor Interrogation System Based on a CCD Spectrometer,
Proceedings of IEEE, Sensors, 1, 909-913 (2003)..
Loss, a (dB)
258
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
259
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
digital code is written. At the same time, the conventional be fulfilled. For the case when the number of pulses is
incremental encoder with minimum two detectors is applied. quadrupled, as it is proposed here, the number of markers (or
Two signals phase shifted for π/2 are needed for the AGV reflecting areas, in the case when an optical reflection method
motion direction determination. is applied) in one sector, for the absolute position
Whenever the determination of the absolute position is determination, is g=2m-2. The (n+m)-bit UP/DOWN counter is
carried out (by direct reading of the digital code in the applied and thus the reached output resolution is (n+m)-bits.
transverse direction) the accumulated encoder errors are The code reading uncertainty problem is solved by using the
automatically eliminated. Further incremental position external synchronization method. Along the code track an
determining is performed with respect to the absolute value of additional synchronization track is placed. The code reading is
the determined position. done at the moment when the sensor head AUT detects the
Any error in the absolute value of the determined position transition between two adjacent sectors, [3], [4].
would represent a systematic error which can be eliminated
only during the next absolute position determination process.
However, this systematic error would be enormously large in
relation to the accuracy and resolution of the applied
incremental encoder. Except this drawback, the disadvantage
of a large number of code tracks also remains. For the case of
movable systems with a wide range of movement, even at
relatively low resolution of the absolute position
determination the number of code tracks is so large, that the
proposed hybrid system becomes economically unacceptable
for the implementation.
260
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
correction for the least significant bit is automatically III. EXPERIMENTAL RESULTS
performed during the measuring system autocalibration.
The proposed measuring system operates according to the The development of an experimental system can be of great
incremental method. At the moment when the synchronization importance for the research of various solutions of position
head AUT detects the transition between two sectors, of width encoders. The realization of different encoder solutions
d, the pseudorandom code reading is done. In this case, the requires the code tracks manufacturing, which can be
control logic for LOAD signal obtaining is very simple and expensive and impractical because the obtained solutions need
can be realized by using the Schmitt circuit (or the the application of different code reading methods. Therefore,
comparator) and edge detector. Converting of the read code the simulation of the system movement and the testing of the
into the natural code gives the absolute position of the AGV. proposed encoder electronic block should be performed with
At the same time a pulse is obtained at the output of the delay the computer and the corresponding hardware application.
circuit and the absolute position is loaded as a new state of the In order to test the electronic block of the position encoder,
counter. These n bits of the AGV current position are an experimental system consisted of the computer, the parallel
respectively entered in the first n inputs of the UP/DOWN I/O card and the microprocessor development system based
counter starting from the input of the greatest weight. In the on the Intel 8031, is built (Fig. 2.). So, in this experimental
next m-1 counter stages the logic zeros are entered. At the system configuration the electronic block of the
least significant input logic one or logic zero is fed depending pseudorandom position encoder is realized by using the
on the AGV movement direction, Fig. 1. In this way the microprocessor development system based on the Intel 8031,
measuring system autocalibration is performed. It continues to while the computer is used for the simulation of the movable
work according to the incremental method and in relation to system movement. By starting the program for the simulation
the new counter state. of the movable system movement at the corresponding
This increase of this solution complexity in relation to the parallel outputs of the I/O card the signals, equal to those
pseudorandom position encoder complexity is insignificant which would be obtained at the output of sensor heads for the
comparing to the quality obtained. The proposed hybrid given movement route, are generated. These signals are fed to
position encoder is a cost-effective solution even for movable the port 1 of the Intel 8031microprocessor. After the testing is
systems with the highest requirements. It can be applied in finished, by using the tabular or graphical presentations the
systems with the wide range of movement, which require high given series of positions and the obtained series of positions
precision and high resolution of the position measuring can be compared. The tabular view provides the continuous
because of the mutual influence with the other production information about the measuring system working regime.
units. Since all the real situations can be simulated, including
However, the act of autocalibration represents a critical damaged or contaminated measuring tracks, there is no reason
moment in the functioning of the hybrid position encoder. to expect a different behavior of the measuring system in its
That is the reason why the hybrid position encoder has not concrete application. In other words, the test results fully and
found its application in practice until today. The word realistically characterize the proposed position encoder.
"calibration" implies the existence of a reference against
which the correction is made. The question is whether the
measured absolute position satisfies the criteria of one
reference. At first instant it does. The code is written on a
physical track and it can be read only at precisely determined
locations. Such information can be accepted as a reference,
but it is necessary to ensure the conditions that will guarantee
that no errors will happen during the code reading procedure.
Unfortunately, no one can claim that in real industrial
conditions such terms will be provided. Approaching to these
ideal conditions can be very expensive, but it does not solve
the problem. Therefore, in this paper we started with a new
approach. The additional information is introduced for Fig. 2. Testing of the position encoder electronic block
indicating the presence of an error, with the probability of
one, in the pseudorandom code reading. For the realization of The electronic block has been tested during a period of
the hybrid position encoder the detector of the pseudorandom several months and for over a thousand randomly selected
code reading errors is required. It confirms that the obtained AGV movement routes. After the measuring system entered
pseudorandom code word corresponds to a certain physical into the normal working regime, for the ideal measuring
reference, with which the current AGV position coincides. tracks located in an ideal environment case, there is no typical
Only in this case the measuring system autocalibration is AGV movement which would lead to an error in the position
done. Otherwise, if such confirmation does not exist, the determination or which would take the measuring system out
obtained pseudorandom code word will not be accepted as the of its normal working regime.
reference and the measuring system autocalibration will not The simulation of incremental and code track
occur. In this way the autocalibration frequency becomes contamination can be done with the program that has been
lower, but the possibility of the course error is eliminated. already developed for the simulation of the movable system
261
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
262
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
I. INTRODUCTION
“Stability” is the ability of the vessel to return to its initial
position before capsizing after the inclining forces have
ceased to operate. Hence the stability issue is an issue of the
ship behavior in transverse and longitudinal angle inclination
caused by external effects. The change of the stability is
searched by the change of the metacentric height and the Fig.1. Stability at external effects
corresponding coefficients. The existing dependences for
evaluating the stability are based on the criterion of minimal Furthermore, some basic assumptions are usually taken into
starting metacentric altitude and guarantee basically the consideration, one of which is the principle of the geometric
starting stability. This report presents a new method for inverse which states that the vessel is always considered
evaluating the stability using “dynamic metacentric height” upright and the waterline WL is inclining at a certain angle
(DMCH). ( ). Assume that the point M is the cross point of the
directrix of two infinitely closed buoyancy forces. At
moderate and big angles of the heel, after applying the
II. METHOD FOR EVALUATING THE DMCH principle of geometric inverse, the point M doesn’t lie down
in the diametrical plane CL of the ship. This assumption
When sailing each vessel is exposed to external forces like
wind, heavy sea, surge and etc. Its safety depends on the makes pointless the using of GM and it’s necessary to
seaworthiness quality - stability. In basic aspects this means investigate the change of the arm GZ (the arm of the righting
that the ship must counteract the negative force effects. That is
to say not to heel to dangerous angles and to redress its initial moment) or the righting moment itself ( M r ). Hence
balance after the external influences are over. According to M r GZ (1)
the magnitude of the heeling angle (transverse inclination of
could be represented as a function of the heeling angle
the vessel) the stability is classified in two types: initial
stability and stability at moderate and big angles of list (heel). GZ f1 ( ) or M r f 2 ( ) (2)
In both cases the counteraction is due to the couple forces: denoted as Static Stability Curve (SSC). (Figure 2)
buoyancy (Archimedes) force and the weight P . They form a
moment M r that is the bases of stability and is opposite to
the heeling moment M l . At small angles is defined the
1
Mariya Eremieva, 2Viktoriya Sabeva, 3Mariya Nikolova,
4
Emiliya Koleva are at the Engineering Faculty at Naval Academy
“Nikola Yonkov Vaptsarov”, 73 Vasil Drumev str, Varna 9026,
Bulgaria, Fig.2 – Dynamic areas in Static Stability Curve
e-mails respectively:
eremievam@abv.bg, viktoriya_sabeva@yahoo.com,
mpn@abv.bg, emiliya_f@abv.bg.
263
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
264
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
265
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
1
2
1
2
X1A X1A dependencies of the frequencies ratio of both generators. The results
X1 X1 for two quartz generators with frequencies FS1.1 = FS1.2 = 5 MHZ and
FS2.1 = FS2.2 = 10 MHZ are presented, respectively on fig.6 and fig.7.
1
2
F1.1 / F1.2 = ϕ (T )
1
2
Y1 C2
Y1 C2 1,000001
1,0000005
R1 R2
R1 R2
1
F1.1/F1.2
D1A D1B
C1 D1A C1 D1B 0,9999995
1 4 Out Out
3 6 1 2 3 4
2 5 0,999999
0,9999985
Fig.3. Capacitive converter 0,999998
Fig.2. Capacitive converter with with CMOS integrated circuit 20 30 40 50 60 70 80
TTL integrated circuit T [o C]
Fig.6. Dependence F1.1 / F1.2= φ (Т), where FS = 5 MHz
IV.EXPERIMENTAL RESULTS F2.1 / F2.2 = ϕ (T )
1,000018
1,000016
For greater accuracy and precision of the sensor it is 1,000014
F2.1/F2.2
necessary to use two identical generators. The experiments were 1,000012
performed with two pairs of generators. It was used different 1,00001
types of quartz resonators with serial resonance frequency FS 1,000008
varying from 1 MHz to 10 MHz in dependence on the lowest 1,000006
1,000011
F1.1, F1.2 {MHz]
5,0005
1,00001
5,00045 1,000009
1,000008
5,0004
1,000007
5,00035
1,000006 F1 [MHz]
5,0003
F2 [MHz]
1,000005
20 30 40 50 60 70 80 3 3,5 4 4,5 5 5,5 6
o
T [ C] U [V]
Fig.4. Dependence Fx = φ (T), where FS = 5 MHz Fig.8. Dependence F1.1 = φ (U), F1.2 = φ (U)), where FS = 1MHz
9,99725 5,0007
f2.1,MHz
f2.2,MHz
F2.1, F2.2 [MHz]
9,9972 5,0006
F2.1, F2.2 [MHz]
9,99715 5,0005
9,9971
5,0004
9,99705
5,0003
9,997
5,0002 F1 [MHz]
9,99695
F2 [MHz]
5,0001
9,9969
3 3,5 4 4,5 5 5,5 6
20 30 40 50 60 70 80
U [V]
T [oC]
Fig.9. Dependence F2.1 = φ (U) F2.2 = φ (U), where FS = 5 MHz
Fig.5. Dependence Fx = φ (T), where FS = 10 MHz
Fig.8 and fig.9 illustrate the dependences of the generator’s
It is clearly seen from results that the deviation of the frequencies frequency FX for change of the voltage UX if the frequencies of quartz
is extremely small – bellow 10-4 for FS = 5 MHZ and bellow 2.10-5 resonators are FS1.1 = FS1.2 = 1 MHz and FS2.1 = FS2.2 = 5 MHz. The
for FS = 10 MHZ with changes in ambient temperature with 45° C. figures show that the frequency is changed in very small range – of
This corresponds to instability, less than 10-5 / °C (FS = 5 MHZ) and the order of 5.10-6/V for the first resonator and below 10-4/V for the
less than 10-6 / °C (FS = 10 MHZ). second in case of voltage alteration U from 4 to 6V.
266
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
Next two figures (fig.10 and fig.11) are connected with Dependencies of the frequencies of the generators FX.Y by the
investigation the impact of the variation of the voltage on the ratio of variation of the ambient temperature T, given frequencies of the quartz
the generators’ frequencies, respectively, for frequencies of both resonators, respectively FS = 5 MHz and FS = 10 MHz are presented on
quartz generators FS1.1 =FFS1.2 =/ 1FMHZ=and FS2.1 = FS2.2 = 5 MHZ.
ϕ (U) fig.12 and fig.13. Temperature instability under these conditions is less
1.1 1.2 ϕ
1,0000047 than 10-5/°С for FS = 5 MHz and bellow 10-6/°С for FS = 10 MHz.
1,0000046 As mentioned in the previous section for proposed schemes (fig.2,
1,0000045
fig.3) the temperature dependence of the ratio of both generators’
F1.1 / F1.2
1,0000044
1,0000043 frequencies is more importantly. It can be seen from fig.14 and fig.15
1,0000042 that the temperature instability of the ratio F1.1 / F1.2 is less than 10-
1,0000041 6
/°С if FS1.1 = FS1.2 = 5 MHZ, respectively for F2.1 / F2.2 the instability is
1,000004
1,0000039 bellow 3.10-7/°С for FS2.1 = FS2.2 = 10 MHZ.
1,0000038
1,000007
3 3,5 4 4,5 5 5,5 6
U [V] 1,000006
1,000005
Fig.10. Dependence F1.1 / F1.2= φ (U), where FS = 1 MHz
2.1 2.2
F1.1 / F1.2
1,000004
1,000005
1,000003
1
1,000002
0,999995
F2.1 / F2.2
1,000001
0,99999
1
0,999985 0,999999
0,99998 20 30 40 50 60 70 80
o
T [ C]
0,999975
0,99997
Fig.14. Dependence F1.1 / F1.2= φ (Т), where FS = 5 MHz
3 3,5 4 4,5 5 5,5 6
1,000018
U [V] 1,000016
1,000014
Fig.11. Dependence F2.1 / F2.2= φ (U), where FS = 5 MHz 1,000012
F2.1/F2.2
1,00001
As it was expected variation of voltage U led to alteration in
1,000008
ratio of the frequencies of both generators bellow 5.10-7/V for FS 1,000006
= 1MHz and less than 10-5/V for FS = 5 MHz. 1,000004
1,000002
B. Investigations of capacitive converter with CMOS 1
integrated circuit 20 30 40 o
T[ C]
50 60 70 80
The results of experimental studies of the scheme on fig.3 are Fig.15. Dependence F2.1 / F2.2= φ (Т), where FS = 10 MHz
presented on fig.12 ÷ fig.19. The last group of studies are related to determining influence of
5,0008
F1.1 [MHz]
F1.2 [MHz]
changes in voltage on the frequency of generator, given frequencies of
5,00075
quartz resonators, respectively F
FS1.1
1.1= FS1.2
,F 1.2==1MHz and FS2.1 = FS2.2 = 5MHz.
ϕ (U)
5,0007
1,000012
F1, F2
5,00065 1,000011
F1.1, F1.2 [MHz]
5,0006 1,00001
1,000009
5,00055
1,000008
5,0005
1,000007
20 30 40 50 60 70 80
o F1 [MHz]
T [ C] 1,000006
F2 [MHz]
1,000005
Fig.12. Dependence F1.1 = φ (Т), F1.2 = φ (Т), where FS = 5 MHz
3 3,5 4 4,5 5 5,5 6
U [V]
9,9975
9,99745
F2.1 [MHz] Fig. 16. Dependences F1.1 = φ (U), FS1.2 = φ (U), for FS = 1 MHz
F2.2 [MHz]
9,9974 5,0007
9,99735
F2.1, F2.2
5,0006
9,9973
9,99725 5,0005
9,9972
5,0004
9,99715
9,9971 5,0003
9,99705 F1 [MHz]
5,0002
9,997
F2[MHz]
20 30 40 50 60 70 80 5,0001
o 3 3,5 4 4,5 5 5,5 6
T [ C]
U X[V]
Fig.13. Dependence F2.1 = φ (Т), F2.2 = φ (Т), where FS = 10 MHz
Fig.17. Dependences F2.1 = φ (U), F2.2 = φ (U), for FS = 5 MHz
267
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
From the resulting dependences, shown on fig.16 and fig.17 2. Using a common stabilized power source of both
follows that the instability of the generators’ frequencies under the generators (fig. 20), with instability of the output voltage below
relevant conditions (F1.1, F1.2, F2.1, F2.2 ) to alteration the voltage is less 0,125 V, also enhanced the sensitivity of the capacitive sensor
than 10-5/V for FS = 1 MHz and bellow 10-4/V for FS = 5 MHz. over 10 times.
Finally, the ratio of frequencies of both generators dependences The proposed integrated stabilizer gives one additional
to variation of voltage, respectively, for frequencies of both quartz advantage of the sensor – the option of its power to be turned on
generators FS1.1 = FS1.2 = 1 MHz and FS2.1 = FS2.2 = 5 MHz are and off for a predefined period of time. This allows the insertion
displayed on fig.18 and fig.19. The frequency instability of both of the sensor in wireless sensor network.
generators is less than 10-6/V. 6
D1
2
Vout
C2 C+ Vout
1,0000047
R1 + C3
1,0000046 5
1,0000045 C- 1
Shutdow n PGOOD
F1.1 / F1.2
1,0000044 7
SHDN
1,0000043 3 8
1,0000042 Vin Vin SELECT
C1 GND
1,0000041 +
1,000004 MCP1252 4
1,0000039
1,0000038
3 3,5 4 4,5 5 5,5 6
U [V] Fig.20. Source of stabilized voltage with control options
Fig.18. Dependence F1.1 / F1.2= φ (U), for FS = 1 MHz
VI.CONCLUSION
1,000005
1
It has been made a number of investigations related to
0,999995
F2.1 / F2.2
0,99999
reduction of the destabilizing influence of ambient temperature
0,999985 and supply voltage to the frequencies of two quartz generators
0,99998 used in capacitive sensor. Based on results was developed high-
0,999975
0,99997
sensitive intelligent capacitive sensor for monitoring extremes
3 3,5 4 4,5 5 5,5 6 of bulk materials. The proposed sensor can be used as a node of
U [V]
a wireless sensor network.
Fig.19. Dependence F2.1 / F2.2= φ (U), for FS = 5 MHz
ACKNOWLEDGEMENT
V. ANALYSIS
This work was supported by the National Science Funds, under Grant
As it is well known the value of frequency instability varies No НП3/2012 “Изследване на комуникационни системи с
depending on particular scheme and used quartz resonator. It използване на цифрови сигнални процесори”.
can be concluded from made experiments that for proposed
schemes of capacity sensor the influence of the variation of the REFERENCES
ambient temperature and voltage to generated frequencies is [1] Dargie W., Ch. Poellabauer. Fundamentals of Wireless Sensor
extremely small. Networ:Theory and Practice, Wiley, 2010. Proc. of The VII Int.
In addition for further increasing the sensitivity of the Conf. ELECTRONICS’98, Book 3, pp. 108-113, 1998
designed capacitive sensor it is necessary to be ensured the [2] J. Yick, B. Mukherjee, D. Ghosal, Wireless sensor network survey,
Computer Networks, Vol. 52, Issue 12, pp.2292-2330, Aug. 2008
equal working conditions for both (the measuring G1 and the
[3] Драганов В., Д. Драганов, Н. Ненков, П. Балабански
supporting G2) generators of the scheme shown in Fig.1. Устройство за измерване на ниво” Авт. свидетелство №
This was achieved in following ways: 45168, МПК – С 01 G 23/26, 08.01.1988
1. To ensure a very small difference in operating temperatures of [4] Draganov V., Il. Tanchev. Possibilities for Registering the Changes of
both generators it was proposed constructive decision using Capacity of a Capacity Convecter. Proc. of the Int. Conf
common integrated circuit for both generators. The quartz Electronics’2004, Sozopol, 22-24 Sep 2004, Book 3, pp.195-199.
resonators were mounted much close to each other. Their [5] Draganov V., Il. Tanchev. Device for Measuring the Level of Bulk
temperature was aligning by an additional thermal connection with Materials in Bunkers, Proc. of the Int. Conf. ICEST’2005, Nish,
heatsink with heat-conveying paste. Serbia, Vol. 1, pp 379-381, June 2005.
Thus, it was assured the temperature difference substantially [6] Markova V., R. Dimova, V. Draganov ,An architecture design of
a monitoring level sensor system”, Annual Journal of
below 1°C, which leads to increase of the capacitive sensor’s Electronics, Vol. 5, N 2, 2011, pp. 37-39, ISSN 1313-1842
sensitivity more than 10 times, as seen from experimental results. [7] Draganov V., Т. Тrifonovа, V. Мarkovа, R. Dimova, D.Kaneva
„Precise measurement opportunities of very small capacity c
268
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
269
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
values are 0, the XOR will reveal a 0 regardless of the generator is generally faster than the Fibonacci in hardware
location of the taps. Therefore, the fed back value is always 0, due to the reduced number of logic gates in the feedback loop.
and the shift register stays in the 0000000 state. If one of the Now, the total propagation delay in the feedback
feedback values are inverted, or XNOR instead XORs are configuration is equal to the propagation delay of only one
used, the forbidden state may be altered. logical gate. The order of the Galois weights is opposite that
Also, in the serial pseudorandom/natural code converter of the Fibonacci weights, for given identical feedback set. The
one 7-bit counter is added that counts steps and also the logic pseudorandom/natural code converter based on the Galois
for the initial state identification. The basic advantage of this generator is shown in Fig. 2. It is added a logic that the read
code converter is simplicity, and the disadvantage is the serial code word converts to the appropriate content of the shift
connection of logical elements (XOR gates) in the feedback register. When the code word is read, this logic provides the
configuration, which increases the total propagation delay and equivalent state of the shift register that is loaded in that shift
thus conversion time is limited. On the other hand, the register. This logic does not participate further in the code
conversion time limits the maximum rotation speed of the conversion process and thus negligibly influences to
encoder. The table which contains for maximal length conversion time. Furthermore, the steps counted that are
pseudorandom sequences feedback sets for different shift needed for the shift register with the determined and the
register sizes is given in [2, 8]. written state come from the known initial state of the shift
One way of reducing the code conversion time of the register. The obtained number is the result of the conversion,
previous method approximately two times is based on the idea the same as in the case of the known serial code converter
that, thanks to PRBS cycling property, the initial state could (Fig. 1). In the second part of the paper the proposed logic for
be reached using feedback sets that are used for either “direct” translation of the read code word in the appropriate content of
or “inverse” PRBS generating [9]. Depending on the previous the shift register is explained in detail, without which it would
position of the movable system it is decided which PRBS not be possible to realise the new code converter.
generating low (“direct” or “inverse”) would be used for
current code conversion.
Another solution for code conversion process is using the
III. LOGIC FOR INITIAL ADJUSTMENT OF READ
Galois implementation of PRBS generator, which consists of a PSEUDORANDOM CODE WORD
shift register, the content of which is modified at every step by
a binary-weighted value of the output stage, using XOR gates. The read n-bit pseudorandom code word (assigned as x =
The pseudorandom binary sequence generator with a parallel xnxn−1xn−2. . . . . . x2x1) in real time is not identical to the n-bit
feedback logic configuration (Galois generator of current content of the shift register (assigned as X =
pseudorandom binary sequence) is known as a faster XnXn−1Xn−2. . . X2X1), which corresponds to the position of this
pseudorandom binary sequence generator [10]. The Galois code word in the generated pseudorandom binary sequence.
For each n-bit code word of the pseudorandom binary
270
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
sequence there corresponds exactly one state of the shift The relations for the parallel feedback logic configuration are
register with a parallel feedback logic configuration and it is well known, based on the known serial feedback logic
possible to design a simple logic composed from XOR gates configuration of the n-bit shift register [8]. According to basic
(Fig. 2). For n = 7 will be shown process of logic design, and mathematical relationships X7’ = X6, and X7’ = x6, can be
such a procedure is applicable to any other pseudorandom concluded
binary code word of arbitrary length. On the Fig. 3 is shown
passing through the states of the 7-bit shift register with a X 6 = x6 (2)
parallel feedback logic, which is known as a ‘Galois’ shift Then, after the second clock pulse the content of the shift
register [8, 10]. On the start, suppose that the initial content of register becomes {X7’’, X6’’, X5’’, X4’’, X3’’, X2’’, X1’’}.
the shift register is {X1, X2, X3, X4, X5, X6, X7} and the According to previous principle the following relations are
pseudorandom code word {x1, x2, x3, x4, x5, x6, x7} corresponds obtained:
to that content. The direct generation law of PRBS and the
moving direction from X1 to X7 is applied. The pseudorandom X7’’ = X6’
bit output is always identical to the state X7, and X6’’ = X5’
X5’’ = X4’
X 7 = x7 (1)
X4’’ = X7’ ⊕ X3’
After the first clock pulse, the content of the shift register X3’’ = X7’ ⊕ X2’
becomes {X7’, X6’, X5’, X4’, X3’, X2’, X1’}, where, in X2’’ = X7’ ⊕ X1’
accordance with the direct generation law of pseudorandom X1’’ = X7’
binary sequences for n = 7:
Since X7’’ = x5 and X7’’ = X6’, plus from the previous clock
X7’ = X6 pulse the valid relation is X6’ = X5, there is obtained
X6’ = X5
X5’ = X4 X 5 = x5 (3)
X4’ = X7 ⊕ X3 With the identical procedure for the next clock pulse or by
X3’ = X7 ⊕ X2 writing the relations on the same principle and using the
X2’ = X7 ⊕ X1 relations from the previous clock pulse, and also properties of
X1’ = X7 modulo-2 sum, the following dependences are obtained:
271
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
272
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
273
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
a Slave node, a replacement Slave node can be rebuilt with the sensor data and Google Maps integration for RTUs
same data. localization, a Wiki, etc. The conditions can include price,
It is thus very important to make sure that the state data region (ex. China) or specific hardware (ex. 64 bit CPU).
present in Master node is well protected. This could be Conditions are somehow called Service Level Agreements
implemented by hosting Master node on a trusted IaaS (SLA) in other architectures but they are considered here
infrastructure with redundant resource. Or - better - by hosting rather as trading specifications than guarantees. It is even
multiple Master nodes on many Slave nodes located in possible to specify a given computer rather than relying on the
different regions of the world thanks to appropriate data automated marketplace logic of SlapOS Master.
redundancy heuristic. We are touching here the first reflexive By default, SlapOS Master acts as an automatic
nature of SlapOS. A SlapOS master is normally a running marketplace. Requests are processed by trying to find a Slave
instance of SlapOS Master software instantiated on a node which meets all conditions which were specified.
collection of Slave nodes which, together, form a trusted SlapOS thus needs to know which resources are available at a
hosting infrastructure. In other terms, SlapOS is self-hosted, given time, at which price and under which characteristics.
as seen in Fig. 1. Last, SlapOS Master also needs to know which software can
be installed on which Slave node and under which conditions.
C. SlapOS Slave
274
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
D. SlapOS kernel In the case of private Cloud, IPv6 replaces existing corporate
tunnels with a more resilient protocol which provides also a
SlapOS relies on mature software: buildout and wider and flat corporate addressing space. IPv6 addressing
supervisord. Both software are controlled by SLAPGrid, the helps allocating hundreds of IPv6 addresses on a single server.
only original software of SlapOS. SLAPGrid acts as a glue Each running process can thus be attached to a different IPv6
between SlapOS Master node (ERP5) and both buildout and address, without having to change its default port settings.
supervisord, as shown in Fig. 3. SLAPGrid requests to Accounting network traffic per computer partition is
SlapOS Master Node which software should be installed and simplified. All this would of course be possible with IPv4 or
executed. SLAPGrid uses buildout to install software and through VPNs but it would be much more difficult or less
supervisord to start and stop software processes. SLAPGrid resilient. The exhaustion of IPv4 addresses prevents in
also collects accounting data produced by each running practice allocation of some many public IPv4 addresses to a
software and sends it back to SlapOS Master. single computer. After one year of experimentation with IPv6
Supervisord is a process control daemon. It can be used to in Romania, using IPv6 native Internet access (more than 50%
programmatically start and stop processes with different users, of worldwide IPv6 traffic), we found that IPv6 is simple to
handle their output, their log files, their errors, etc. It is a kind use and creates the condition for many innovations which
of much improved init.d which can be remotely controlled. would else be impossible.
Supervisord is lightweight and old enough to be really mature
(ie. no memory leaks).
Buildout is a Python-based build system for creating,
III. RESEARCH RESULTS AND FUTURE DESIGN
assembling and deploying applications from multiple parts,
some of which may be non-Python-based. Buildout can be In order to collect the information from the RTUs we
used to build C, C++, ruby, java, perl, etc. software on Linux, developed the following test platform as shown in Fig. 4. The
MacOS, Windows, etc. Buildout can either build applications usage of GSM/GPRS data transmission can be extended in
by downloading their source code from source repositories areas where there is no coverage by using a UHF bridge
(subversion, git, mercurial, etc.) or by downloading binaries operating in the fixed frequency range 430 – 440 MHz
from package repositories (rpm, deb, eggs, gems, war, etc.). connected to a gateway that has access to the Internet.
Buildout excels in particular at building applications in a way
which is operating system agnostic and to automate
application configuration process in a reproducible way.
275
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
The total quantity of rain reported by the system during the IV. CONCLUSION
months of May – September 2011 was of 222 l/sqm with the
following monthly distribution: May – 33 l/sqm, June – 116 Our system for environmental telemetry can be adapted
l/sqm, July – 49 l/sqm, August - 5 l/sqm, September – 8 l/sqm. also to other applications besides agriculture and meteorology.
Other climatic parameters such as Precipitation, Leaf Knowing how the weather will be is important but knowing
Wetness, Temperature and Relative Humidity can be seen on how the environmental parameters are right now is just as
Fig. 6. much important for power plants, airports, wind and solar
parks, incinerators and landfills - they all need wind,
temperature, radiation data, etc. reliably and up to date.
Even though IPv6 is used to interconnect processes globally
on a SlapOS public or private Cloud, we found that some
existing software on RTUs are incompatible with IPv6.
Reasons varry. Sometimes, IP addresses are stored in a
structure of 3 integers, which is incompatible with IPv6.
Sometimes, IPv6 URLs are not recognized since only dot is
recognized as a separator in IP addresses. For this reason, we
decided to provide to each computer partition a dedicated,
local, non routable IPv4 address.
We hope in the future that Microsoft Windows will also be
Fig. 6. Results climatic parameters during a week (26.09 – supported as a host (Microsoft Windows is already supported
02.10.2011) as a guest) through glibc implementation on Windows and a
port of supervisord to Windows.
Another important parameter we studied is the
accumulation of thermal energy over time, known as degree- ACKNOWLEDGEMENT
days or heat units. The growth and development of plants,
insects, and many other invertebrate organisms is largely This paper is presented as part of the project “Valorificarea
dependent on temperature. In other words, a constant amount capitalului uman din cercetare prin burse doctorale
of thermal energy is required for the growth and development (ValueDoc)” Project co-financed from the European Social
of many organisms, but the time period over which that Fund through POSDRU, financing contract
thermal energy is accumulated can vary. Many organisms POSDRU/107/1.5/S/76909 and part of the project “Cloud
slow or stop their growth and development when temperatures Consulting” and “TELE GREEN”.
are above or below threshold levels. Degree-days and other
heat unit measurements have been used for determination of
planting dates, prediction of harvest dates, and selection of REFERENCES
appropriate crop varieties.
[1] Tokihiro Fukatsu, Tomonari Watanabe, Haoming Hu, Hideo
Yoichi, Masayuki Hirafuji, “Field monitoring support system
for the occurrence of Leptocorisa chinensis Dallas (Hemiptera:
Alydidae) using synthetic attractants, Field Servers, and image
analysis”, Computers and Electronics in Agriculture, vol. 80,
January 2012, pp. 8–16, 2012
[2] Jiang, J.A.; Tseng, C.L.; Lu, F.M.; Yang, E.C.; Wu, Z.S.; Chen,
C.P.; Lin, S.H.; Lin, K.C.; Liao, C.S., “A GSM-based remote
wireless automatic monitoring system for field information: A
case study for ecological monitoring of the oriental fruit fly,
Bactrocera dorsalis (Hendel)”, Computers and Electronics in
Agriculture vol. 62, Issue 2, July 2008, pp. 243–259, 2008
[3] George Suciu, Octavian Fratu, Simona Halunga, Cristian
George Cernat, Vlad Andrei Poenaru, Victor Suciu, “Cloud
Consulting: ERP and Communication Application Integration in
Open Source Cloud Systems”, 19th Telecommunications Forum
Fig. 7. Heat units graphs (daily degree-days and total) - TELFOR 2011, IEEE Communications Society, pp. 578-581,
2011
The calculation methods available for heat unit include: [4] Heithem Abbes, Christophe C´erin, and Mohamed
Averaging, Standard, GDD (Growing Degree-Days), Single Jemni.Bonjourgrid as a decentralised job scheduler. In APSCC
Triangle, Double Triangle, Single Sine, Double Sine and Near 08.Proceedings of the 2008 IEEE Asia-Pacific Services
Real-Time. As shown in Fig. 7 we used the Averaging ComputingConference, pages 89–94,Washington, DC,
Method and the maximum heat unit (26,3 degree days) was USA,2008. IEEE Computer Society.
[5] Heithem Abbes, Christophe C´erin, Mohamed Jemni: A
calculated on the date of 10.07.2011 and the total accumulated
decentralized and fault-tolerant Desktop Grid system for
thermal energy by the crop on 01.10.2011 was 3.484,2 degree- distributed applications. Concurrency and Computation:
days. Practice and Experience 22(3): 261-277 (2010)
276
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
277
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
You may notice that topics which in the narrower sense acquired knowledge and skills in the everyday life. In table III
belong to the core field of electro-technics are more present in is given the curriculum for this school subject signed by the
the 7th class. As this is a more comprehensive subject it Ministry of Education and Science of Serbia [1]. The school
requires a solid background in mathematics and other subject Technical and informatics education has grown out
fundamental areas of physics. Almost the entire 8th class from the previous school subject Technical education which
curriculum is dedicated to the electrotechics (Fig. 1). The was studied according to the old curriculum. With the new
teaching plans and programmes include laboratory practical curriculum this school subject leaves more room for studying
drills and experiments with interactive work with pupils as a informatics which is specifically done by introducing some
support in the process of knowledge acquisition of the creative elements in the teaching process, which will be more
relevant fields of physics. Learning quality critically depends talked about in the section IV [1]. Besides the regular classes,
on the level of the school teaching aids equipment. With there are also complementary classes held for the pupils who
regards to the electro-technics teaching, the physics laboratory have dispositions for this subject and for those who want to
at primary school “Cele Kula”, Nis is an example of a well- enter the competitions in this field [2].
equipped teaching aids school which include: complete The goal of the school subject Information technology (IT)
electrostatics experiments, influent machine, mathematical and computer technique is to enable pupils to use computers,
and electrical pendulum, Faraday’s cage, electrical car to gain informatics literacy as well as to enable them to apply
models, alternator, voltmeter, various resistors and the use of computers and IT in everyday life and work (Table
conductors, magnetic field, various magnets, magnetic needle, IV). According to the current curriculum for primary schools,
compass, Ersted’s experiment. This is similar in most Serbian this is an optional subject. Besides the classes which are held
schools. Teachers of physics believe that teaching of physics as regular classes, there are also complementary classes held
will be more qualitative, interesting and attractive to pupils if for the pupils who have dispositions for this subject and for
the schools had larger numbers of teaching aids, but teaching those who want to enter the competitions in this field [2].
aids expansion is limited by the budget which is regulated by TABLE IV. INFORMATION TECHNOLOGY AND COMPUTER TECHNIQUE –
the authorised state institutions. CURRICULUM
Apart from the regulated number of regular class hours,
knowledge in this subject is also gained from supplement Course name: Information Technology and Computer Technique
class hours aimed at less successful pupils and from 5th grade Course duration in teaching hours: 36 per school years
complementary class hours in the format of young physicist Computer operating system (14), Text editing (14), Introduction to
groups. These groups are aimed at pupils with special interest multimedia (8)
in physics who would like to promote their high level of 6th grade Course duration in teaching hours: 36 per school years
acquired knowledge by the means of taking part in Text editing (10), Internet (4), Computer graphics (10), Computer
animation (3) Elective modules (9)
competitions whish are supported by the Ministry of
Education and Science of the Republic of Serbia [2]. 7th grade Course duration in teaching hours: 36 per school years
Internet (6), Audio processing (4), Video processing (6), WWW
TABLE III. TECHNICAL AND INFORMATICS EDUCATION - CURRICULUM presentation design (10) Elective modules (10)
Course name: Technical and informatics education 8th grade Course duration in teaching hours: 68 per school years
5th grade Course duration in teaching hours: 62 per school years Computer spreadsheets (10), Elective modules (16), Software
programming (14), Computer networks and WWW presentations (14),
Introduction (2), Traffic (8), Graphic communications (16), From idea to Development of individual projects in the filed of information technology
realization (8), Materials and technologies (12), Energy systems (4), and computer technique (14)
Constructive modeling (12)
6th grade Course duration in teaching hours: 72 per school years Figure 1 shows the percentage of hours per subject Physics
Introduction to the architecture and construction (4), Technical drawing and Information technology and computer technique, which is
(8), Information technology (16), Building materials (4), Energy systems directly related to the study in the field of electrotechnics and
(4), Technical resources in construction (4), Traffic systems (2), Housing
culture (4), Constructive modeling (22), Technical resources in
informatics. It can be seen that the presence of of these
agriculture (4) teaching hours increases from lower to higher grades.
7th grade Course duration in teaching hours: 72 per school years 120%
Introduction to mechanical engineering (2), Technical drawing in
mechanical engineering (8), Information technology (14), Materials (2), 100%
Measurement and control (2), Materials processing technology (4),
Machines and Mechanisms (16), Robotics (2), Energy systems (6), 80%
Constructors modeling - Modules (16) Phisics
8th grade Course duration in teaching hours: 68 per school years 60%
Information technology (16), Electrical materials and installation (10), Technical and IT
Electrical machines and devices (14), Digital electronics (12) 40% education
From idea to realization - Modules (16)
20%
The general goal of the school subject (course) Technical
0%
and informatics education is to get the pupils acquainted with 5th grade 6th grade 7th grade 8th grade
the technical and technologically developed surrounding
through the acquisition of new technical and informatics Fig. 1. The percentage of teaching hours in which pupils learn
knowledge and skills, as well as to enable them to apply the lessons that directly relate to electrotechnics and informatics
278
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
279
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
Attend supplementary clasess and members phisics section pupils with an aim to compliment the education in the
Attend supplementary clasess only
fields of electrotechnics and informatics and increase
Members of phisics section
their interest in further education in these particular
Not attend supplementary clasess and not members of phisics section
fields
Fig. 7. Percentage of pupils who attend supplementary classes Improving the organisation and increasing the general
in physics or who are members of physics section technical and educational level of competition in the
7.0% area of electronics and informatics in order to attract
5.9% 6.4%
6.0% more pupils to participate in these competitions
5.0% 4.4% 4.4% 4.2%
Today’s rapid development of electrotechnics and
4.0%
3.0% 2.5% 2.5% informatics and their increasing presence in all areas of social
1.7% 1.7%
2.0% 1.2% 1.0%1.2%
living requires continuous updating of primary school
1.0% curriculum with the latest news in these fields. Modern plans
0.0% and programmes in high schools across the EU have the
School level Municipal level Regional level Republic level
fastest dynamics of adapting to those changes. One of the
Phisics popular solutions to adapt the plans and programmes to
Technical and informatics education changes in primary schools is their coordination with relevant
Information Technology and Computer Technique programmes in high schools [6]. National Education Council
in the Republic of Serbia has a vital role in continuous
Fig. 8. Percentage of pupils who participated at different monitoring and analyzing of the state of education on all
levels of competition (overview is given by the subjects and levels and its coordination with the European principles and
levels of competition) values. In accordance with this the council makes decisions on
changes and coordination of the primary schools plans and
IV. OPPORTUNITIES FOR IMPROVING THE PRIMARY programmes in educational areas of interest [3]. Primary
EDUCATION QUALITY IN THE FIELD OF schools participation in TEMPUS projects, financed and
approved by the EU, is a great opportunity to get help and
ELECTROTECHNICS AND INFORMATICS support for the process of modernizing primary schools plans
and programmes through their coordination with high schools
Beside the Ministry of Education and Science of the programmes [6].
Republic of Serbia which is the main and responsible The improvement of quality of education in primary
institution for implementing of all levels of education, in schools is unthinkable without introduction of certain
Republic of Serbia today there are a few more important state educational standards which are in coordination with the EU
institutions whose work have an influence on pupils’ primary standards. During the last few years the Republic of Serbia
education. They are [3-5]: has been making huge efforts to incorporate and implement
- National education council of the Republic of Serbia such standards in primary education. As a direct result of
- Center for improving education and schooling those efforts, in 2009, National Education Council has passed
- Center for assessment of education quality and schooling an act “the educational standards for the end of compulsory
The work of these institutions is coordinated and they work education”. Those standards originated from working on
very closely with each other. These institutions have the project by the Ministry of Education and s Sport of the
Republic of Serbia named: “Development of schooling in the
280
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
281
I C E S T 2012 28-30 JUNE, 2012, VELIKO TARNOVO, BULGARIA
consideration that the Minister of Education and Science of school aids should be modernized in accordance with the
the Republic of Serbia has given priority to information – curriculum and syllabus. Serbian Government is making great
communication technologies in the last 3years, programmes effort with its ministries to enable such modernization of
for professional development in the field of technology and school aids in primary schools. An example for this is the
informatics are significantly more present in the catalogues project “Digital School”. As the quality of education depends
and are available to teachers. Yet another important way of on how much the teachers are trained to transfer modern
teachers’ professional development is their participation in knowledge to pupils, special attention is paid to teachers’
professional conferences and seminars. One example of training in the field of electrotechnics and informatics so that
professional conference which is important for primary school they are constantly involved in special trainings, attending
teachers’ development who are teaching electrotechnics and obligatory classes and being able to participate conferences
informatics is International Conference on Technics and and seminars. Today there are evident efforts being made in
Informatics – TIO organised by the Faculty of Technical order to adopt appropriate educational standards for all school
Science in Cacak [13]. subjects (courses) which are in accordance with EU standards
With the aim to make electrotechnics and informatics more which will lead to the further improvement in quality of
popular among primary school pupils, as well as enable them primary school education. Special attention is paid to
to widen their knowledge in this area, they are given an coordination of syllabus and curriculum of primary schools
opportunity to attend professional seminars, summer schools, with those in secondary schools and faculties. In the end, it is
lectures and workshops. “Summer school of science” hugely very important to point out that there are great efforts made to
popular among primary school pupils in Serbia, supported by organize competitions, seminars, lectures and other activities
UNESCO, takes place in Petnica and it can offer rich and for the pupils who want to complement the education in the
interesting programmes in the field of electronics and field of electrotechnics and informatics, which surely leads to
computing [14]. Primary school “Cele Kula” in Nis as well as an increase in pupils’ interest for further education in these
significant number of other schools in Serbia organise a very fields.
popular “Science Fair”where numerous experiments and REFERENCES
examples of practical teaching are demonstrated to pupils.
Also, the numbers of joint workshops for primary and [1] Education Programme for Primary Schools (School year
secondary pupils have been increasing in order to motivate the 2011/2012), Serbian Ministry of Education and Science, 2011.
[2] Competitions and Festivals Calendar for Primary School Pupils
primary school pupils choose some of the electrotechnics
(School year 2011/2012), Serbian Ministry of Education and
modules in their secondary education. Science, 2011, http://www.mpn.gov.rs/prosveta/page.php?page=156.
Improvement of organisation and increase of the general [3] National Education Council of the Republic of Serbia
technical and educational level of competition in the field of http://www.nps.gov.rs
electrotechnics and informatics is yet another way of [4] National Institute for Education and Upbringing Improvement,
widening pupils’ knowledge which has the impact on the http://www.zuov.gov.rs/
increase of the quality of education in general. Ministry of [5] National Institute for Education and Upbringing Quality
Education and Science has been making efforts to find Evaluation, http://www.ceo.edu.rs
additional finances for improving the organisation of [6] TEMPUS Project JP 516762-2011: "Harmonization and
Modernization of the Curriculum for Primary Teacher
competitions and adequately rewarding the achievements in
Education", http://www.tempus.ac.rs/projects-tempus/view/797/49/
order to increase the number of pupils – competitors. [7] Education Standards for End of Compulsory Education, Serbian
Engaging financial sponsors outside of education can help Ministry of Education and Science, National Institute for
resolving this problem. Education and Upbringing Quality Evaluation, Belgrade, 2009
http://www.ceo.edu.rs/images/stories/publikacije/Obrazovni%20standar
di%202009.pdf
V. CONCLUSION [8] M. Sanader, "Educational Standards of Achievements in the
New educational plans and programmes for primary Course on Technology and Informatics in Primary Schools", 3rd
schools which are regulated by the Ministry of Education and International Conference on Technics and Informatics in
Science of the Republic of Serbia have been coordinated with Education - TIO 2010, Conference Proceedings, pp.176-192,
Cacak, Serbia, 2010.
modern tendencies in the field of electrotechnics and
[9] Project ”Digital School”, Serbian Ministry of Culture, Media
informatics. They offer acquisition of the latest knowledge in and Information Society, Serbian Digital Agenda,
these fields which are developing very fast today and a special http://www.digitalnaagenda.gov.rs
attention is paid to the units referring to computers and [10] Kvark Media–Multimedia workshop, http://www.kvarkmedia.co.rs
informatics. A huge interest of pupils for studying and [11] M. Paroskaj, M. Mitrovic, " Use of ICT in Modernize and
acquiring knowledge from the field of electro-technics and Bringing Up Quality of Technical and Informatical Education in
informatics, which is shown in the conducted survey, justifies Primary School", 3rd International Conference on Technics and
these changes in the primary schools curriculum. These Informatics in Education - TIO 2010, Conference Proceedings,
curriculum and syllabus have established a foundation for pp.468-474, Cacak, Serbia, 2010.
[12] Rulebook of continuous professional training and acquiring of
acquiring high-quality knowledge in the mentioned fields
teacher, educator and professional associate titles, Sl. glasnik
which represents a beginning of education for successful RS (br. 14/2004, 56/2005)
engineers. The survey shows that a huge number of pupils [13] International Conference on Technics and Informatics in
demand the increase of practical work in the fields of electro- Education – TIO, http://www.tfc.kg.ac.rs/tio2012/
technics and computers, which inevitably leads to the fact that [14] Petnica Science Center, http://www.petnica.rs
282
AUTHOR INDEX
A D
Acevska V. ............................ 387, 447
Damnjanovic M.............................163
Acevski I................................ 387, 447
Demirev V.......................................21
Acevski N. .....................................235
Denić D................................. 259, 269
Aćimović S. ...................................407
Denishev K....................................495
Agatonovic M. ..............................311
Despotović V......................... 573, 577
Aleksandrova M.................... 495, 509
Devic S.................................. 463, 467
Aleksieva V. ..................................439
Dimitrijevic T...................................29
Alexiev V.........................................89
Dimitrov B. ........................... 544, 548
Altimirski E......................................37
Dimitrov D. ...................................243
Andonova A. .................................541
Dimitrov K................ 55, 307, 599, 603
Angelov K.................................. 37, 51
Dimitrov V. ........................... 283, 567
Angelov K........................................85
Dimitrova E...................................571
Angelov P.............................. 521, 525
Dimkina E. ....................................371
Antolović I. ...................................212
Dimov A........................................485
Antonov S. ....................................375
Dimova R. .....................................283
Apostolov P. .................................117
Dimovski T. .....................................43
Aprahamian B. ..............................564
Djosic S. ........................................163
Arnaudov R...................................255
Djugova A. ......................................59
Arsić M. ................................ 259, 269
Djukovic M....................................463
Asenov O. ............................. 359, 428
Dobrev D. .....................................307
Atanasov I............................. 327, 418
Dobrikov G....................................509
Atanasovski M. .............................243
Dochev I. ......................................595
Atlagic B. .............................. 463, 467
Docheva L. ............................ 367, 595
Avramova N..................................403
Dochkova-Todorova I. ...................206
B Dokoski G. ....................................471
Dončov N.............................. 299, 311
Babic D. ........................................135 Đorđević G....................................105
Bakardjieva T. ...............................167 Đorđević M...................................212
Balabanov G. ..................................89 Drača D...........................................77
Balzhiev P. ....................................255 Draganov I. ........................... 143, 155
Bankov K.........................................71 Draganov V. ..................................265
Banković B. ........................... 552, 556 Dzhakov R.....................................121
Békefi Á. .........................................39 E
Bekjarski A............................ 367, 603 Eftimov T. .....................................255
Blagojević D. .................................303 Eremieva M. ......................... 159, 263
Bock W. ........................................255
Bodurov G. ...................................509 F
Bogdanović N................................303 Fahlberg-Stojanovska L. ................447
Bojchev D. ....................................471 Fehér A...........................................39
Bonev B. ................................... 25, 37 Fratu O. ...........................1, 5, 93, 273
Brodić D.........................151, 573, 577 Furkov G. ......................................232
Brusev T........................................513 G
Bucsa I. .............................................5
Gadjeva E.............................. 228, 505
C Gajić D. ................................. 216, 190
Gajic M. ........................................463
Cernat C................................ 175, 273 Galabov M. ...................................435
Cherneva G....................371, 493, 571 Gechev M. ......................................51
Cholakova I. .......................... 499, 509 Georgiev M.....................................71
Čičević S........................................407 Georgieva T. .................................343
Ćirić D................................... 113, 131 Georgieva V. .................................247
Craciunescu R. .............................. 1, 5 Gerasimov K. ................................239
Cvetkovic S. ..................................277 Gesheva K.....................................509
Cvetković T. ..................................299 Gjorgjievska S. ..............................194
Goleva R. ........................................89 Lozanovska A. ...............................171
Gorecan Z. ............................ 463, 467 Lubich L. .......................................287
Gradinarova B...............................167 Lukić J................................... 259, 269
Guliashki V....................................208
M
H
Malecic A......................................585
Hadjidimitrov A.............................247
Halunga S......................................1, 5 Malenko M. ..................................194
Hristov G............................... 351, 355 Manev S................................ 319, 321
Manojlović P. ................................295
I Marinov A.....................................548
Ilarionov R. ...................................451 Marinova G........................... 479, 482
Iliev G. ..........................................323 Markova G....................................399
Iliev I................................47, 319, 321 Markova V. ...................................265
Iliev Ivo.........................................502 Markovic D. ..................................331
Iliev M. ................................. 351, 355 Marković I.....................................178
Ivanov H. ........................................55 Martinovic L..................................467
Ivanov H. ......................................435 Matijasevic J. ................................431
Ivanova E. .......................................97 Mićić Z. .........................................295
Mihajlović V.......................... 212, 220
J Mihić D. ........................................212
Jakimovska D. ...............................194 Mihov G........................................383
Jakimovski G. ................................194 Mihov Y. .......................................101
Jakšić B. ........................................315 Mijoski K.......................................235
Janković D.....................................178 Mijoski T. ......................................235
Janković M....................................113 Mikarovski G.................................411
Janković S. ....................................407 Mikhov M. ....................................251
Jankulovska M. .............................387 Milenković A. ................................178
Jelenković M.................................131 Milić D. ................................. 315, 335
Jevtic M. .......................................163 Milijic M. ......................................291
Jokovic J.................................. 29, 299 Milinković S. .................................407
Jordanova L. ......................... 599, 307 Militaru T.............................. 175, 273
Jovanovic Z. ..................................331 Milivojević D. .................151, 573, 577
Milivojević Z..................................151
K Miljković G............................ 259, 269
Kanev J. ..........................................74 Miljković V. ...................................577
Karailiev H. ...................................451 Milosavljević A..............................220
Karailiev V.....................................451 Milosavljevic S. .............................335
Karova M. ............................. 403, 475 Milovanović B. .................29, 299, 311
Katsov R........................................493 Milovanović D...............................303
Kirilov L.........................................208 Milovanovic I. ...............................291
Kitov C. .........................................347 Milutinović V. ...............................299
Kolev G. ................................ 509, 495 Mironov R............................. 139, 603
Kolev N. ..........................................33 Mirtchev S. .....................................89
Kolev S.................................. 319, 321 Mitrevski P......................................43
Koleva E................................ 159, 263 Mitrović N............................. 552, 556
Koleva P........................................359 Mitrović S. ....................................407
Kopta A.........................................295 Mitsev T....................... 25, 33, 55, 599
Kostić V................................. 552, 556 Mladenović S. ...............................407
Kostov N. .......................395, 479, 482
Kotevski A.....................................411 N
Kovačević M.......................... 198, 220
Kovacheva M. ...............................224 Nagy L.............................................59
Krastev G. .....................................422 Nagy S. ...........................................39
Krasteva I......................................485 Necov B. .........................................71
Nedelchev M. .................................47
L Nedelkovski I. ...............................387
Lehtinen V. ...................................135 Nenov I.........................................493
Nenova M.....................................339 Roganović M. ............................... 198
Nikolić B. ......................................105 Ruzin I.......................................... 171
Nikolov B. ............................. 395, 482
S
Nikolov G........................529, 544,581
Nikolov N......................................425 Sabeva V. .............................. 159, 263
Nikolova B. ....................513, 529, 581 Sadinov S. .................................74, 85
Nikolova K.....................................125 Sechkova T................................... 143
Nikolova M. .......................... 159, 263 Sekulović N. ................................... 77
Novakov P.....................................283 Serafimov N. ................................ 513
Shtarbakov V................................ 564
O
Shupak M....................................... 25
Obradović D..................................295 Simeonov I. .................................. 121
Simić M........................................ 259
P
Sirakov E. ..................................... 129
Pacheco C. ......................................63 Sit L.............................................. 311
Pacheco de Carvalho J.....................63 Slavov M. ..................................... 109
Panagiev O.................................. 9, 13 Smiljakovic V................................ 533
Panajotović A..................................77 Spalević P..................................... 315
Pandiev I............................... 224, 517 Spalevic Z..................................... 431
Pargovski J. ...................................171 Spasova V. ................................... 502
Pavlov G. .............................. 371, 493 Stančić I. ...................................... 295
Pavlov M............................... 573, 577 Stanimirovic A.............................. 202
Pavlović N.....................................407 Stankovic A. ................................. 186
Penchev P.....................................109 Stanković D. .......................... 182, 186
Pencheva E. ..................................418 Stanković R. ................................. 190
Penev I.................................. 403, 475 Stankovic Z................... 277, 291, 311
Perić D............................................81 Stavru S........................................ 485
Perić M. ..........................................81 Stefanov T.................................... 455
Pesovic U. .....................................331 Stefanova M................................. 428
Petkov E........................................459 Stefanović Č. ................................ 182
Petkov P. ......................................239 Stefanovic D................................. 335
Petkova Y......................................403 Stefanovic H................................. 335
Petković M....................................105 Stoimenov L. ................................ 202
Petronijević M. ..................... 552, 556 Stojanović D. ................................ 198
Petrov A........................................525 Stojanović M. ............................... 560
Petrova-Antonova D......................485 Stoyanov G................................... 125
Petrović M. ...................................315 Stratev A. ..................................... 232
Pleshkova-Bekiarska S...................375 Streblau M. .................................. 564
Poenaru V............................. 175, 273 Suciu G.................................. 175, 273
Popova A. .....................................147 Šunjevarić M. ................................. 81
Popović M.......................................81
Poulkov V......................................359 T
Predić B. .......................................198
Tabakov S..................................... 502
Tahrilov H. .................... 544, 548, 564
R
Tasić D. ........................................ 560
Radev D. .........................................97 Tasić V. ................................. 573, 577
Radic J. ...........................................59 Tatić D. ................................. 182, 186
Radmanović M..............................216 Temelkovski I. .............................. 315
Radonov R. ...................................593 Tentov A. .............................. 194, 471
Raev R. ...........................................97 Todoran G............................. 175, 273
Rančić D.........................212, 220, 431 Todorov M.. ................................. 529
Randjic S.......................................331 Todorov V.. .................................. 265
Rankovska V. ................................489 Todorova M.. ............................... 425
Reis A. ............................................63 Todorović B.................................... 81
Ristić A..........................................560 Tomic D................................. 463, 467
Tomić S.........................................131 Videkov V.............................. 232, 593
Tomov Y. ......................................323 Videnovic-Misic M.......................... 59
Trifonov T. ....................................121 Vulović D...................................... 202
Trifonov V.....................................418 Vulpe A. ......................................... 93
Trifonova T. ..................................265 Y
Trpezanovski L. .............................243
Tsankov B. ....................................101 Yordanov H. ................................... 17
Tsenov A.........................................67 Yordanova S. ................. 395, 479, 482
Tsvetkova I............................ 351, 355 Z
Tаrpov I. .......................................493
Zahariev P. ............................ 351, 355
V Zdravković J. ................................ 131
Zhilevski M................................... 251
Valchanov H..................................443
Zhivomirov H......................... 129, 379
Valkov G. ......................................228
Živanović D................................... 269
Varbanova N...................................85
Zivanovic Z. .................................. 533
Vasić B..........................................105
Zwick T......................................... 311
Veiga H. ..........................................63