Pub Date : 2015-09-03DOI: 10.1109/EIC.2015.7230741
Shatrughna Prasad Yadav, S. Bera
Power Amplifier (PA) is a very important component in communication systems which consume a significant fraction of the total energy and is mostly nonlinear. There is an inverse relationship between the PA efficiency and its linearity. Nonlinear PAs are desirable from an efficiency point of view. The price paid for higher efficiency is that it causes growth in spectrum and causes adjacent channel interference. It also causes in-band distortion, which degrades the bit error rate (BER) performance. Transmission systems, like orthogonal frequency-division multiplexing (OFDM), has tolerance to inter-symbol interference and good spectral efficiency but are subjected to nonlinearities of power amplifiers, due to their high peak-to-average power ratio (PAPR), which occurs because of large fluctuations in their signal envelopes. To reduce the spectral regrowth and to reduce BER, PA linearization is necessary. In this paper, Peak clipping, random phase shifting, selected mapping (SLM) and dummy sequence insertion (DSI) methods have been presented to reduce the PAPR and consequently the effect of nonlinearity and to improve the spectral and energy efficiency of PA.
{"title":"Nonlinearity effect of high power amplifiers in communication systems","authors":"Shatrughna Prasad Yadav, S. Bera","doi":"10.1109/EIC.2015.7230741","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230741","url":null,"abstract":"Power Amplifier (PA) is a very important component in communication systems which consume a significant fraction of the total energy and is mostly nonlinear. There is an inverse relationship between the PA efficiency and its linearity. Nonlinear PAs are desirable from an efficiency point of view. The price paid for higher efficiency is that it causes growth in spectrum and causes adjacent channel interference. It also causes in-band distortion, which degrades the bit error rate (BER) performance. Transmission systems, like orthogonal frequency-division multiplexing (OFDM), has tolerance to inter-symbol interference and good spectral efficiency but are subjected to nonlinearities of power amplifiers, due to their high peak-to-average power ratio (PAPR), which occurs because of large fluctuations in their signal envelopes. To reduce the spectral regrowth and to reduce BER, PA linearization is necessary. In this paper, Peak clipping, random phase shifting, selected mapping (SLM) and dummy sequence insertion (DSI) methods have been presented to reduce the PAPR and consequently the effect of nonlinearity and to improve the spectral and energy efficiency of PA.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131667170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-03DOI: 10.1109/EIC.2015.7230717
C. D. Rawat, S. Rao
Compression is a technique to reduce the quantity of data without excessively reducing the quality. The transmission and storing of compressed multimedia data is much faster and more efficient than original uncompressed data. There are various techniques and standards for multimedia data compression, especially for image compression. They are either lossless or lossy techniques. Arithmetic and Huffman coding are two of the widely used lossless compression techniques. Burrows Wheeler Transform(BWT) is a sorting technique which when used with the available compression algorithms can considerably increase the compression ratio. Here a hybrid compression model using BWT with Arithmetic Coding(AC) and Huffman Coding is analysed for image compression and improvement in overall compression is documented.
{"title":"Evaluation of Burrows Wheeler Transform based image compression algorithm for multimedia applications","authors":"C. D. Rawat, S. Rao","doi":"10.1109/EIC.2015.7230717","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230717","url":null,"abstract":"Compression is a technique to reduce the quantity of data without excessively reducing the quality. The transmission and storing of compressed multimedia data is much faster and more efficient than original uncompressed data. There are various techniques and standards for multimedia data compression, especially for image compression. They are either lossless or lossy techniques. Arithmetic and Huffman coding are two of the widely used lossless compression techniques. Burrows Wheeler Transform(BWT) is a sorting technique which when used with the available compression algorithms can considerably increase the compression ratio. Here a hybrid compression model using BWT with Arithmetic Coding(AC) and Huffman Coding is analysed for image compression and improvement in overall compression is documented.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121590669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-03DOI: 10.1109/EIC.2015.7230730
Mudra Doshi, G. Anuradha
A Semantic Web is able to describe things in such a way that computers can understand easily. Statements are built using syntax rules, which are the rules for building the language. The Semantic Web is not about links between pages. The Semantic Web describes the relationships and properties between things. There are different ways of converting the existing web pages into semantic web pages. The primitive one uses a reverse engineering approach. A reverse engineering approach is to specify Web Service according to the Web Service Modeling Ontology (WSMO). It describes a model-driven Web Service reverse engineering process, where Web Service Descriptions (WSDL) are transformed to UML models, which are then integrated into composite Web Services and finally the new Web Services Descriptions are generated i.e. OWL. Another approach is Semantic Annotation Web Service Description Language (SAWSDL) interfacefiles by using transformation rules. The proposed architecture is a result of the combinationabove two existing architectures.
{"title":"Proposed framework for Semantic Web Services","authors":"Mudra Doshi, G. Anuradha","doi":"10.1109/EIC.2015.7230730","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230730","url":null,"abstract":"A Semantic Web is able to describe things in such a way that computers can understand easily. Statements are built using syntax rules, which are the rules for building the language. The Semantic Web is not about links between pages. The Semantic Web describes the relationships and properties between things. There are different ways of converting the existing web pages into semantic web pages. The primitive one uses a reverse engineering approach. A reverse engineering approach is to specify Web Service according to the Web Service Modeling Ontology (WSMO). It describes a model-driven Web Service reverse engineering process, where Web Service Descriptions (WSDL) are transformed to UML models, which are then integrated into composite Web Services and finally the new Web Services Descriptions are generated i.e. OWL. Another approach is Semantic Annotation Web Service Description Language (SAWSDL) interfacefiles by using transformation rules. The proposed architecture is a result of the combinationabove two existing architectures.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122399427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-03DOI: 10.1109/EIC.2015.7230740
Medha Kulkarni
Steganography is used to establish secure communication between two parties. Steganalysis, the detection of steganography by third party is relatively young discipline. The art and science of steganalysis, is intended to detect hidden information, estimation of hidden message length, and its extraction. Steganalysis has recently received a great deal of attention both from law enforcement and the media. Thus, many scholars have engaged in the field. Recently, the JPEG format attracted the attention of researchers as the main steganographic format. JPEG images are very abundant on the Internet bulletin boards and public Internet sites. F5 is a steganography algorithm based on frequency domain. It has been widely used because of its high capacity and robustness. It embeds secret data into quantized non-zero DCT coefficients of JPEG image. F5 algorithm uses matrix encoding technique to minimize the number of changes done. The JHRF algorithm is used to unhide the data embedded by F5. In this paper, An JPEG, information hiding algorithm, uses non-overlapping blocks of 16 *16 pixels. By embedding secret information into JPEG image by rules, JHRF can handle larger steganography capacity. It can deal effectively with abnormal data and get better results.
{"title":"An information hiding system using 16*16 quantization table","authors":"Medha Kulkarni","doi":"10.1109/EIC.2015.7230740","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230740","url":null,"abstract":"Steganography is used to establish secure communication between two parties. Steganalysis, the detection of steganography by third party is relatively young discipline. The art and science of steganalysis, is intended to detect hidden information, estimation of hidden message length, and its extraction. Steganalysis has recently received a great deal of attention both from law enforcement and the media. Thus, many scholars have engaged in the field. Recently, the JPEG format attracted the attention of researchers as the main steganographic format. JPEG images are very abundant on the Internet bulletin boards and public Internet sites. F5 is a steganography algorithm based on frequency domain. It has been widely used because of its high capacity and robustness. It embeds secret data into quantized non-zero DCT coefficients of JPEG image. F5 algorithm uses matrix encoding technique to minimize the number of changes done. The JHRF algorithm is used to unhide the data embedded by F5. In this paper, An JPEG, information hiding algorithm, uses non-overlapping blocks of 16 *16 pixels. By embedding secret information into JPEG image by rules, JHRF can handle larger steganography capacity. It can deal effectively with abnormal data and get better results.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125910600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-03DOI: 10.1109/EIC.2015.7230699
Mitesh Solanki, Paresh M. Dholakia, Kargathara Sunera
Today's wireless communication system demands a sharing of multimedia information at higher data rate and constant connectivity for efficient multimedia information transmission. One of the possible solutions to fulfill theses requirements is adaptive modulation technique. As user in mobility moves towards base station or access point user's device receive more power so higher order modulation schemes are possible with good signal-to-noise ratio (SNR). At the same time there are changes in signal quality because of changing SNR due to movements. Due to that, also quality of services (QoS) is also affected. According to the changing SNR if modulation schemes are changing then it is possible to maintain constant bit error rate (BER). In this paper we have used the adaptive modulation concept in the Air Interface for Fixed broadband Wireless Access system which is a WiMAX IEEE 802.16 model with multiple antenna system and multicarrier modulation (OFDM). We have implemented and simulated the model with real time changing SNR (which indicates movement) simultaneously changing the modulation scheme according to SNR. In the results we observed the SNR vs. BER plots and real time information (image) on different modulation scheme which is used in the adaptive scheme with high and low SNR values. From the plot of the SNR vs. BER we found the constant BER which satisfies the objective.
{"title":"On constant BER analysis for real time information transmission and adaptive modulation in WiMAX MISO system","authors":"Mitesh Solanki, Paresh M. Dholakia, Kargathara Sunera","doi":"10.1109/EIC.2015.7230699","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230699","url":null,"abstract":"Today's wireless communication system demands a sharing of multimedia information at higher data rate and constant connectivity for efficient multimedia information transmission. One of the possible solutions to fulfill theses requirements is adaptive modulation technique. As user in mobility moves towards base station or access point user's device receive more power so higher order modulation schemes are possible with good signal-to-noise ratio (SNR). At the same time there are changes in signal quality because of changing SNR due to movements. Due to that, also quality of services (QoS) is also affected. According to the changing SNR if modulation schemes are changing then it is possible to maintain constant bit error rate (BER). In this paper we have used the adaptive modulation concept in the Air Interface for Fixed broadband Wireless Access system which is a WiMAX IEEE 802.16 model with multiple antenna system and multicarrier modulation (OFDM). We have implemented and simulated the model with real time changing SNR (which indicates movement) simultaneously changing the modulation scheme according to SNR. In the results we observed the SNR vs. BER plots and real time information (image) on different modulation scheme which is used in the adaptive scheme with high and low SNR values. From the plot of the SNR vs. BER we found the constant BER which satisfies the objective.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126379141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-03DOI: 10.1109/EIC.2015.7230748
Radhaprasanna Merugu, S. Pai
Industrial environment consists of more than one controlling/monitoring modules built around microcontrollers which may not belong to same family. Considering the need of communication between different microcontrollers in such situations “Microcontroller based temperature and luminosity control system using CAN bus” is designed to demonstrate the same. Controller Area Network (CAN) protocol is used to achieve long distance communication. It was developed to support applications like real time control system. It is ideally suited for many rugged applications like automotive applications. The paper describes the advantages of CAN communication and hardware designing of each node. The system is designed with one master and two slaves, where the master sets the parameter values of both the slaves and the slave set its respective parameters accordingly. At the slave side there is control action module to maintain the set value. The communication between the master and the slave takes place via CAN bus. Security of system is very important when it comes to dealing with some parameters in industry. So a fingerprint identification module is employed in the system.
{"title":"Microcontroller based temperature and luminosity control system using CAN Bus","authors":"Radhaprasanna Merugu, S. Pai","doi":"10.1109/EIC.2015.7230748","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230748","url":null,"abstract":"Industrial environment consists of more than one controlling/monitoring modules built around microcontrollers which may not belong to same family. Considering the need of communication between different microcontrollers in such situations “Microcontroller based temperature and luminosity control system using CAN bus” is designed to demonstrate the same. Controller Area Network (CAN) protocol is used to achieve long distance communication. It was developed to support applications like real time control system. It is ideally suited for many rugged applications like automotive applications. The paper describes the advantages of CAN communication and hardware designing of each node. The system is designed with one master and two slaves, where the master sets the parameter values of both the slaves and the slave set its respective parameters accordingly. At the slave side there is control action module to maintain the set value. The communication between the master and the slave takes place via CAN bus. Security of system is very important when it comes to dealing with some parameters in industry. So a fingerprint identification module is employed in the system.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134078814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-03DOI: 10.1109/EIC.2015.7230719
Kavita Tewari, Renu L. Kalakoti
Fingerprint Recognition is one of the oldest and popular methods for person identification. There are two major approaches of fingerprint recognition namely image based and minutiae based. This paper presents an image based fingerprint recognition method. In this work first core point is detected and pre processing of image is done then transformation technique like Fast Fourier Transform (FFT), Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Gabor Filter are used for feature extraction. These features consist of mean energy, standard deviation and Shannon entropy. The good recognition accuracy is achieved on the FVC 2002 database. Comparison of all the four transform is presented here and it is observed that DCT and DFT gives better result as compared to DWT and Gabor filter.
{"title":"Fingerprint Recognition and feature extraction using transform domain techniques","authors":"Kavita Tewari, Renu L. Kalakoti","doi":"10.1109/EIC.2015.7230719","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230719","url":null,"abstract":"Fingerprint Recognition is one of the oldest and popular methods for person identification. There are two major approaches of fingerprint recognition namely image based and minutiae based. This paper presents an image based fingerprint recognition method. In this work first core point is detected and pre processing of image is done then transformation technique like Fast Fourier Transform (FFT), Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Gabor Filter are used for feature extraction. These features consist of mean energy, standard deviation and Shannon entropy. The good recognition accuracy is achieved on the FVC 2002 database. Comparison of all the four transform is presented here and it is observed that DCT and DFT gives better result as compared to DWT and Gabor filter.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130963828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-03DOI: 10.1109/EIC.2015.7230736
Supriya Mandhare, Rajkumar K. Shende
Popularity of cloud computing increasing now days. With the increasing use of cloud computing we can share information, resources, and data also we can store our personal as well as business information. Though it provides various advantages like pay-as-you-use, high flexibility, multi tenancy but with the new computing and communication paradigms arises data security challenges. Existing data protection mechanisms failed in preventing data stealing attacks performed by an insider or hacker to the cloud provider. In this work, four layers of security to data have been proposed which will provide highest security to data. Four layers will consist of user authentication, user access rights, encryption of users data and in the last layer hacker cannot access more information than the part which is stored in the cloud because system will automatically differentiates the file breaks and disjointly stores on different locations.
{"title":"An intelligent approach for data fortification in cloud computing","authors":"Supriya Mandhare, Rajkumar K. Shende","doi":"10.1109/EIC.2015.7230736","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230736","url":null,"abstract":"Popularity of cloud computing increasing now days. With the increasing use of cloud computing we can share information, resources, and data also we can store our personal as well as business information. Though it provides various advantages like pay-as-you-use, high flexibility, multi tenancy but with the new computing and communication paradigms arises data security challenges. Existing data protection mechanisms failed in preventing data stealing attacks performed by an insider or hacker to the cloud provider. In this work, four layers of security to data have been proposed which will provide highest security to data. Four layers will consist of user authentication, user access rights, encryption of users data and in the last layer hacker cannot access more information than the part which is stored in the cloud because system will automatically differentiates the file breaks and disjointly stores on different locations.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121086328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-03DOI: 10.1109/EIC.2015.7230707
Pooja Sangmeshwar Kalshetti, S. Koli
Video transmission over 802.11 wireless networks poses many challenges. Bandwidth demands and timing constraints are two major challenges for real time video transmission over wireless. To increase network throughput as well as overall network capacity, the use of cross layer design approach is required. One of such design approaches includes physical (PHY) and medium access control (MAC) layers considerations and is explored in this paper. This survy paper describes a detailed study of the MAC and PHY layer considerations for good wireless video transmission performance. The ultimate solution for the problem of real time video transmission is to study the different methods of adapting parameters for achieving the delay constraints in real time environment. The best techniques available in literature are studied for adapting the parameters which are suitable for real time video transmission. This study focuses on adaptive retry limit (ARL) parameter for MAC layer and PHY layer parameter like Enhanced Adaptive Forward Error Correction (EnAFEC) for real time video transmission that can be supported by a wireless network. The new scheme for optimizing the wireless network's MAC and PHY layer parameters is proposed in this work.
{"title":"MAC-PHY layer optimization for digital video transmission in wireless network","authors":"Pooja Sangmeshwar Kalshetti, S. Koli","doi":"10.1109/EIC.2015.7230707","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230707","url":null,"abstract":"Video transmission over 802.11 wireless networks poses many challenges. Bandwidth demands and timing constraints are two major challenges for real time video transmission over wireless. To increase network throughput as well as overall network capacity, the use of cross layer design approach is required. One of such design approaches includes physical (PHY) and medium access control (MAC) layers considerations and is explored in this paper. This survy paper describes a detailed study of the MAC and PHY layer considerations for good wireless video transmission performance. The ultimate solution for the problem of real time video transmission is to study the different methods of adapting parameters for achieving the delay constraints in real time environment. The best techniques available in literature are studied for adapting the parameters which are suitable for real time video transmission. This study focuses on adaptive retry limit (ARL) parameter for MAC layer and PHY layer parameter like Enhanced Adaptive Forward Error Correction (EnAFEC) for real time video transmission that can be supported by a wireless network. The new scheme for optimizing the wireless network's MAC and PHY layer parameters is proposed in this work.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126155585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-09-03DOI: 10.1109/EIC.2015.7230723
Srividya Rajaraman, Pritam S. Sirpotdar, Abhijeet Wavare, A. Patki
Very Long Instruction Word is an architectural breakthrough in DSP architecture that caters to the real time constraints and efficient algorithm implementation. This paper brings out various loopholes namely latency, underutilization of functional units, use of NOPs and constraints of cross path in register file accessing present in such architecture. This paper proposes a technique to reduce the delay slots present in the pipeline due to NOPs and hence obtain reduction in code size and reduced latency. With the available functional units, thread level parallelism is introduced to enhance existing instruction level parallelism, thus addressing the issue of under utilization of functional units. Aforementioned issues are dealt with by the use of multithreading - concept frequently associated with multi-core DSPs and RTOS. This paper reports a novel technique of introducing a programming discipline in assembly coding to emulate multithreading in a single core DSP without use of OS and reduction in the number of clock cycles required is observed. Code snippets implemented using Code Composer Studio for TMS320C6713 illustrate the concepts.
超长指令字(Very Long Instruction Word)是DSP体系结构中的一个突破,它满足了实时约束和高效算法实现的要求。本文指出了该体系结构存在的各种漏洞,即延迟、功能单元利用率不足、nop的使用以及寄存器文件访问中的交叉路径约束。本文提出了一种技术来减少由于nop而出现在管道中的延迟槽,从而减少代码大小和减少延迟。在现有功能单元的基础上,引入线程级并行来增强现有的指令级并行,从而解决功能单元利用率不足的问题。前面提到的问题是通过使用多线程来解决的,这个概念经常与多核dsp和RTOS相关。本文报道了一种新的技术,在汇编编码中引入编程规则来模拟单核DSP中的多线程,而不使用操作系统,并且观察到所需时钟周期的数量减少。使用TMS320C6713的Code Composer Studio实现的代码片段说明了这些概念。
{"title":"Multithreading implementation in a single core TMS320C6713 DSP","authors":"Srividya Rajaraman, Pritam S. Sirpotdar, Abhijeet Wavare, A. Patki","doi":"10.1109/EIC.2015.7230723","DOIUrl":"https://doi.org/10.1109/EIC.2015.7230723","url":null,"abstract":"Very Long Instruction Word is an architectural breakthrough in DSP architecture that caters to the real time constraints and efficient algorithm implementation. This paper brings out various loopholes namely latency, underutilization of functional units, use of NOPs and constraints of cross path in register file accessing present in such architecture. This paper proposes a technique to reduce the delay slots present in the pipeline due to NOPs and hence obtain reduction in code size and reduced latency. With the available functional units, thread level parallelism is introduced to enhance existing instruction level parallelism, thus addressing the issue of under utilization of functional units. Aforementioned issues are dealt with by the use of multithreading - concept frequently associated with multi-core DSPs and RTOS. This paper reports a novel technique of introducing a programming discipline in assembly coding to emulate multithreading in a single core DSP without use of OS and reduction in the number of clock cycles required is observed. Code snippets implemented using Code Composer Studio for TMS320C6713 illustrate the concepts.","PeriodicalId":101532,"journal":{"name":"2014 International Conference on Advances in Communication and Computing Technologies (ICACACT 2014)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116262437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}