Pub Date : 2022-06-24DOI: 10.1109/CONIT55038.2022.9847984
Ravindra M. Malkar, S. Sushanth Kumar, M. Tarambale
Economic Power Dispatch is a critical component of the power system network (EPD). It assigns required load to online producing units while accounting for system constraints. The fundamental purpose of EPD is to lower overall power generation costs. For example, the bi-objective Combined Emission- Economic Dispatch (CE-ED) problem addresses the environmental impacts of fossil fuel power plant emissions. The bi-objective challenge reduces both fuel costs and emissions. Generators are simulated using quadratic cost functions to match their output restrictions. The non-linear, non-convex objective functions and equality and inequality requirements make the EPD issue more feasible. Recent evolutionary algorithms have improved results, especially for complex optimization problems. These methods identify global optimum solutions in non-convex and large solution domains. Recent algorithms search the solution space at random utilising numerous candidate solutions. Evolving algorithms must be able to get answers by exploring the feasible zone rather than researching the complex region. So the optimization process is speedier and consumes less calculation time while still finding the global optimum. The traditional technique fails due to premature convergence.
{"title":"Load Management of Economic Power Dispatch using Optimization Algorithm","authors":"Ravindra M. Malkar, S. Sushanth Kumar, M. Tarambale","doi":"10.1109/CONIT55038.2022.9847984","DOIUrl":"https://doi.org/10.1109/CONIT55038.2022.9847984","url":null,"abstract":"Economic Power Dispatch is a critical component of the power system network (EPD). It assigns required load to online producing units while accounting for system constraints. The fundamental purpose of EPD is to lower overall power generation costs. For example, the bi-objective Combined Emission- Economic Dispatch (CE-ED) problem addresses the environmental impacts of fossil fuel power plant emissions. The bi-objective challenge reduces both fuel costs and emissions. Generators are simulated using quadratic cost functions to match their output restrictions. The non-linear, non-convex objective functions and equality and inequality requirements make the EPD issue more feasible. Recent evolutionary algorithms have improved results, especially for complex optimization problems. These methods identify global optimum solutions in non-convex and large solution domains. Recent algorithms search the solution space at random utilising numerous candidate solutions. Evolving algorithms must be able to get answers by exploring the feasible zone rather than researching the complex region. So the optimization process is speedier and consumes less calculation time while still finding the global optimum. The traditional technique fails due to premature convergence.","PeriodicalId":270445,"journal":{"name":"2022 2nd International Conference on Intelligent Technologies (CONIT)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133031063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The use of image processing techniques to analyze CT scan pictures including lung cancer cells is gaining popularity these days. Lung illnesses are diseases that damage the lungs and weaken the respiratory system. Lung cancer is one of the top causes of death in individuals around the world. Humans have a better chance of surviving if they are detected early. The average survival rate for persons with lung cancer increases from 14 to 49 percent if the disease is detected early. While computed tomography (CT) is significantly more effective than X-ray, a full diagnosis requires the use of numerous imaging techniques to complement one another. A deep neural network is constructed and tested for detecting lung cancer from CT images. This strategy is more about diagnosing at ahead of schedule and critical stages with keen computational procedures with different noise is expected to be eliminated by detaching the CT images and calculating the survival rate which is the root idea of digital image processing. A highly linked convolution neural network was used to classify the lung image as normal or cancerous. A dataset of lung pictures is employed, with 85 percent of the photos being used for training and 15% being used for testing and classification.
{"title":"Detection of Cancer in Lung CT Image Using 3D CNN","authors":"Syed Amer Ali, Nikhil Vallapureddy, Sridivya Mannem, Yashwanth Gudla, V. Malathy","doi":"10.1109/CONIT55038.2022.9848092","DOIUrl":"https://doi.org/10.1109/CONIT55038.2022.9848092","url":null,"abstract":"The use of image processing techniques to analyze CT scan pictures including lung cancer cells is gaining popularity these days. Lung illnesses are diseases that damage the lungs and weaken the respiratory system. Lung cancer is one of the top causes of death in individuals around the world. Humans have a better chance of surviving if they are detected early. The average survival rate for persons with lung cancer increases from 14 to 49 percent if the disease is detected early. While computed tomography (CT) is significantly more effective than X-ray, a full diagnosis requires the use of numerous imaging techniques to complement one another. A deep neural network is constructed and tested for detecting lung cancer from CT images. This strategy is more about diagnosing at ahead of schedule and critical stages with keen computational procedures with different noise is expected to be eliminated by detaching the CT images and calculating the survival rate which is the root idea of digital image processing. A highly linked convolution neural network was used to classify the lung image as normal or cancerous. A dataset of lung pictures is employed, with 85 percent of the photos being used for training and 15% being used for testing and classification.","PeriodicalId":270445,"journal":{"name":"2022 2nd International Conference on Intelligent Technologies (CONIT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133062929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Memory allocation is the process of allocating physical or virtual memory space to computer applications and processes. There are two types of memory allocation: static memory allocation and dynamic memory allocation. Static memory allocation in C allocates memory during compile time using stack. It is mainly used when the amount of memory that is required by the program is known. Once the memory is allocated using static memory allocation then the size of the memory allocated cannot change whereas dynamic memory allocation allocates memory to a process/application during its run time. It is used when the amount of memory that a program requires is unknown. It uses a heap for managing memory and the size of the memory allocated can be altered. In this paper, a dynamic memory manager is proposed in Linux OS. The proposed dynamic memory manager is based upon the internal design and implementation of malloc() and free() library functions in C. It is capable of allocating and deallocating memory to a user program/process. It also shows the memory statistics of every object malloc()-ed by a program/process that is currently in use The proposed memory manager overcomes the problem of internal fragmentation.
{"title":"Dynamic Memory Manager: A memory usage Statistical Tool","authors":"Avita Katal, Vitesh Sethi, Ansh Gupta, Aryan Rastogi","doi":"10.1109/CONIT55038.2022.9847757","DOIUrl":"https://doi.org/10.1109/CONIT55038.2022.9847757","url":null,"abstract":"Memory allocation is the process of allocating physical or virtual memory space to computer applications and processes. There are two types of memory allocation: static memory allocation and dynamic memory allocation. Static memory allocation in C allocates memory during compile time using stack. It is mainly used when the amount of memory that is required by the program is known. Once the memory is allocated using static memory allocation then the size of the memory allocated cannot change whereas dynamic memory allocation allocates memory to a process/application during its run time. It is used when the amount of memory that a program requires is unknown. It uses a heap for managing memory and the size of the memory allocated can be altered. In this paper, a dynamic memory manager is proposed in Linux OS. The proposed dynamic memory manager is based upon the internal design and implementation of malloc() and free() library functions in C. It is capable of allocating and deallocating memory to a user program/process. It also shows the memory statistics of every object malloc()-ed by a program/process that is currently in use The proposed memory manager overcomes the problem of internal fragmentation.","PeriodicalId":270445,"journal":{"name":"2022 2nd International Conference on Intelligent Technologies (CONIT)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133117339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-24DOI: 10.1109/CONIT55038.2022.9847693
Y. Kumar, Hemant Gupta
In a variable-speed drive system, speed control is usually required. A three-phase inverter provides variable voltage and frequency to this system. The speed of an induction motor supplied by such a three-phase inverter was controlled using PWM approach as well as a universal connection in this study. A control strategy was developed to regulate a dc voltage inverter's maximum dc bus voltage. Following vector control technology, direct torque control (DTC) is a superior, contemporary, and innovative form of AC machine drive control technology. The Texas instrument TMDSHVMTRPFCKIT is used to build a DTC scheme for Induction Motor Drive utilising the Space Vector Modulation (SVM) approach in this study. Due to its simple architecture, power reversal capabilities, and robust fault current protection of three-phase inverter supplied induction motor (IM) controls have been a popular option in medium-voltage applications. The direction of the rotor flux is also determined. The inductive vehicle's transient response is also carefully investigated.
{"title":"Design and Modelling of Speed Control of Three Phase IM based on PID Controller","authors":"Y. Kumar, Hemant Gupta","doi":"10.1109/CONIT55038.2022.9847693","DOIUrl":"https://doi.org/10.1109/CONIT55038.2022.9847693","url":null,"abstract":"In a variable-speed drive system, speed control is usually required. A three-phase inverter provides variable voltage and frequency to this system. The speed of an induction motor supplied by such a three-phase inverter was controlled using PWM approach as well as a universal connection in this study. A control strategy was developed to regulate a dc voltage inverter's maximum dc bus voltage. Following vector control technology, direct torque control (DTC) is a superior, contemporary, and innovative form of AC machine drive control technology. The Texas instrument TMDSHVMTRPFCKIT is used to build a DTC scheme for Induction Motor Drive utilising the Space Vector Modulation (SVM) approach in this study. Due to its simple architecture, power reversal capabilities, and robust fault current protection of three-phase inverter supplied induction motor (IM) controls have been a popular option in medium-voltage applications. The direction of the rotor flux is also determined. The inductive vehicle's transient response is also carefully investigated.","PeriodicalId":270445,"journal":{"name":"2022 2nd International Conference on Intelligent Technologies (CONIT)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134488843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-24DOI: 10.1109/CONIT55038.2022.9847703
Gouri Anilkumar, M. S. Fouzia, G. S. Anisha
Humans place a high importance on the ability to interact. People with hearing or speaking difficulties had trouble expressing themselves. Despite the fact that sign language solved the problem, they were still unable to engage with the general populace., necessitating the development of sign language detectors. A variety of sign language detection algorithms are effectively open. This research investigates two well-known models for recognizing American Sign Language Gestures for alphabets: MediaPipe-LSTM and YOLO v5-PyTorch. They were given custom datasets., and the outcomes were inferred and compared to see how accurate and effective the models were.
{"title":"Imperative Methodology to Detect the Palm Gestures (American Sign Language) using Y010v5 and MediaPipe","authors":"Gouri Anilkumar, M. S. Fouzia, G. S. Anisha","doi":"10.1109/CONIT55038.2022.9847703","DOIUrl":"https://doi.org/10.1109/CONIT55038.2022.9847703","url":null,"abstract":"Humans place a high importance on the ability to interact. People with hearing or speaking difficulties had trouble expressing themselves. Despite the fact that sign language solved the problem, they were still unable to engage with the general populace., necessitating the development of sign language detectors. A variety of sign language detection algorithms are effectively open. This research investigates two well-known models for recognizing American Sign Language Gestures for alphabets: MediaPipe-LSTM and YOLO v5-PyTorch. They were given custom datasets., and the outcomes were inferred and compared to see how accurate and effective the models were.","PeriodicalId":270445,"journal":{"name":"2022 2nd International Conference on Intelligent Technologies (CONIT)","volume":"314 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124291214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-24DOI: 10.1109/CONIT55038.2022.9847699
V. Rajderkar, V. Chandrakar
The paper presents the design of fuzzy logic controller based unified power flow controller (UPFC) to improve power system security performance during steady state as well as fault conditions. Fuzzy interference has been design with two inputs Vref and Vm for the shunt voltage source Converter and two inputs for Series Id, Idref, Iq, Iqref at the series voltage source converter location. The coordination of shunt and series VSC has been achieved by using fuzzy logic controller (FLC). The comparative performance of PI based UPFC and fuzzy based UPFC under abnormal condition has been validated in MATLB domain. The combination of fuzzy with a UPFC is tested on multi machine system in MATLAB domain. The results shows that the power system security enhancement as well as oscillations damping.
{"title":"Enhancement of Power System Security by Fuzzy based Unified Power Flow Controller","authors":"V. Rajderkar, V. Chandrakar","doi":"10.1109/CONIT55038.2022.9847699","DOIUrl":"https://doi.org/10.1109/CONIT55038.2022.9847699","url":null,"abstract":"The paper presents the design of fuzzy logic controller based unified power flow controller (UPFC) to improve power system security performance during steady state as well as fault conditions. Fuzzy interference has been design with two inputs Vref and Vm for the shunt voltage source Converter and two inputs for Series Id, Idref, Iq, Iqref at the series voltage source converter location. The coordination of shunt and series VSC has been achieved by using fuzzy logic controller (FLC). The comparative performance of PI based UPFC and fuzzy based UPFC under abnormal condition has been validated in MATLB domain. The combination of fuzzy with a UPFC is tested on multi machine system in MATLAB domain. The results shows that the power system security enhancement as well as oscillations damping.","PeriodicalId":270445,"journal":{"name":"2022 2nd International Conference on Intelligent Technologies (CONIT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114337507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-24DOI: 10.1109/CONIT55038.2022.9848203
S. Singh, Shivam, I. Kumar, Jatin Lingala
In the present scenario, the entire world is doing a lot of investments in the field of medical terminology and to achieve advancement in the medical field. Updated resources and adaptability of new technology in the medical field is the key factor the entire world is looking for. Today, undoubtedly Medical Denoising has become a popular research topic, with new studies being published daily. Thus, denoising of images in medical field images has now turned out to be an important research topic for researchers. In the medical field, CT scanning is an important and commonly preferred technique. In this experiment, edge detection based on medical denoising is performed using two different edge detection operators. For image accession, multiple Computed Tomography CT images are taken from the internet and the entire experiment is carried out on those images. The identification is performed using the Canny operator and Sobel operator and further wavelet domain is implemented on those images that are generated by the above-mentioned edge operators. Further, the performance of the selected operators is evaluated using Structure Similarity Index (SSIM), Peak Signal to Noise Ratio (PSNR), and Mean Absolute Error (MAE), of the image. After the successful completion of the experiment, it was found that both the operators produce different forms of output and work completely differently from one other.
{"title":"Edge Detection Based Medical Denoising using Wavelet Domain","authors":"S. Singh, Shivam, I. Kumar, Jatin Lingala","doi":"10.1109/CONIT55038.2022.9848203","DOIUrl":"https://doi.org/10.1109/CONIT55038.2022.9848203","url":null,"abstract":"In the present scenario, the entire world is doing a lot of investments in the field of medical terminology and to achieve advancement in the medical field. Updated resources and adaptability of new technology in the medical field is the key factor the entire world is looking for. Today, undoubtedly Medical Denoising has become a popular research topic, with new studies being published daily. Thus, denoising of images in medical field images has now turned out to be an important research topic for researchers. In the medical field, CT scanning is an important and commonly preferred technique. In this experiment, edge detection based on medical denoising is performed using two different edge detection operators. For image accession, multiple Computed Tomography CT images are taken from the internet and the entire experiment is carried out on those images. The identification is performed using the Canny operator and Sobel operator and further wavelet domain is implemented on those images that are generated by the above-mentioned edge operators. Further, the performance of the selected operators is evaluated using Structure Similarity Index (SSIM), Peak Signal to Noise Ratio (PSNR), and Mean Absolute Error (MAE), of the image. After the successful completion of the experiment, it was found that both the operators produce different forms of output and work completely differently from one other.","PeriodicalId":270445,"journal":{"name":"2022 2nd International Conference on Intelligent Technologies (CONIT)","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114474362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-24DOI: 10.1109/CONIT55038.2022.9847901
Jayant Rathi, Kalp Talwadia, Hritvik Jamwal, Shailender Kumar
Medical Image Segmentation has an imperative job in diagnostic systems on various applications. Ultrasounds, X-rays, MRI, CAT and PET (Positron Emission Tomography) are dynamic and developing domains for research especially in image-processing techniques and algorithms. This field has also attracted significant investments and developments in recent times. Deep Learning models, specifically the Convolutional Neural Network Models (CNN) are state-of-art technologies for identifying medical ailments through visual imagery. The objective of this research is to develop and implement a DepthWise Convolution model that provides high accuracy in detecting Covid 19 Pneumonia from lung x-rays. We also juxtapose it with other models which have great accuracy i.e Transfer Learning Models.
{"title":"Depth Wise Convolution on Chest X-Ray & Comparative Analysis With Transfer Learning","authors":"Jayant Rathi, Kalp Talwadia, Hritvik Jamwal, Shailender Kumar","doi":"10.1109/CONIT55038.2022.9847901","DOIUrl":"https://doi.org/10.1109/CONIT55038.2022.9847901","url":null,"abstract":"Medical Image Segmentation has an imperative job in diagnostic systems on various applications. Ultrasounds, X-rays, MRI, CAT and PET (Positron Emission Tomography) are dynamic and developing domains for research especially in image-processing techniques and algorithms. This field has also attracted significant investments and developments in recent times. Deep Learning models, specifically the Convolutional Neural Network Models (CNN) are state-of-art technologies for identifying medical ailments through visual imagery. The objective of this research is to develop and implement a DepthWise Convolution model that provides high accuracy in detecting Covid 19 Pneumonia from lung x-rays. We also juxtapose it with other models which have great accuracy i.e Transfer Learning Models.","PeriodicalId":270445,"journal":{"name":"2022 2nd International Conference on Intelligent Technologies (CONIT)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114498568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-24DOI: 10.1109/CONIT55038.2022.9848199
Keyur Rathod, Mija S.J.
This paper focuses on the design of robust controllers for the stabilization of CE 150 Humusoft 2-DoF Helicopter system which represents a highly nonlinear & cross coupled system usually subject to external disturbances and parametric uncertainties. A two loop control architecture is used where the inner loop ensures stabilization, error minimization and robustness to parametric uncertainties, matched & unmatched disturbances and the outer loop ensures optimal trajectory tracking without violating actuator saturation bounds. Further, to show the performance of the proposed control scheme, simulation results are presented.
{"title":"Robust Control of 2-DoF Helicopter System in Presence of Unmatched Disturbances & Actuator Faults","authors":"Keyur Rathod, Mija S.J.","doi":"10.1109/CONIT55038.2022.9848199","DOIUrl":"https://doi.org/10.1109/CONIT55038.2022.9848199","url":null,"abstract":"This paper focuses on the design of robust controllers for the stabilization of CE 150 Humusoft 2-DoF Helicopter system which represents a highly nonlinear & cross coupled system usually subject to external disturbances and parametric uncertainties. A two loop control architecture is used where the inner loop ensures stabilization, error minimization and robustness to parametric uncertainties, matched & unmatched disturbances and the outer loop ensures optimal trajectory tracking without violating actuator saturation bounds. Further, to show the performance of the proposed control scheme, simulation results are presented.","PeriodicalId":270445,"journal":{"name":"2022 2nd International Conference on Intelligent Technologies (CONIT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117131608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-24DOI: 10.1109/CONIT55038.2022.9848195
Shivali, M. Khosla
In Formal Verification Environment, setup time and hold time are not honored by formal verification tool. To analyze the impact of metastability on functionality of the design in formal verification environment, buffer has been designed. Buffer induces the delay of either ‘0’, ‘1’ or ‘2’ clock cycles leading to metastability in the pointers of Asynchronous Gray Code FIFO in formal verification environment. Reference code has been written which describe the functionality of Asynchronous Gray Code FIFO in ideal case. Using formal equivalence checking, output of FIFO obtained from design provided by the designer, is compared with the output obtained from the reference code of FIFO. Formal verification properties are written to do the verification of the design and check if the design is working as predicted specifications. Coverage written ensures no corner case is skipped which may lead to escapism of potential design bugs. The command language script containing the verification program has been run to invoke the JasperGold Tool. Comparative analysis has been done between the waveforms obtained from the design including a buffer and the design without including a buffer. If both the waveforms are not same which means metastability has influenced the functionality of the design. So, to overcome the effect of metastability on functionality of the design, there is need to add more synchronizers in the design. While if the waveforms obtained from the design with and without buffer are same, it means synchronizers / Meta flops already present in the design are enough to deal with the metastability which may arise during functioning of the design.
{"title":"Coverage of Meta-Stability Using Formal Verification in Asynchronous Gray Code FIFO","authors":"Shivali, M. Khosla","doi":"10.1109/CONIT55038.2022.9848195","DOIUrl":"https://doi.org/10.1109/CONIT55038.2022.9848195","url":null,"abstract":"In Formal Verification Environment, setup time and hold time are not honored by formal verification tool. To analyze the impact of metastability on functionality of the design in formal verification environment, buffer has been designed. Buffer induces the delay of either ‘0’, ‘1’ or ‘2’ clock cycles leading to metastability in the pointers of Asynchronous Gray Code FIFO in formal verification environment. Reference code has been written which describe the functionality of Asynchronous Gray Code FIFO in ideal case. Using formal equivalence checking, output of FIFO obtained from design provided by the designer, is compared with the output obtained from the reference code of FIFO. Formal verification properties are written to do the verification of the design and check if the design is working as predicted specifications. Coverage written ensures no corner case is skipped which may lead to escapism of potential design bugs. The command language script containing the verification program has been run to invoke the JasperGold Tool. Comparative analysis has been done between the waveforms obtained from the design including a buffer and the design without including a buffer. If both the waveforms are not same which means metastability has influenced the functionality of the design. So, to overcome the effect of metastability on functionality of the design, there is need to add more synchronizers in the design. While if the waveforms obtained from the design with and without buffer are same, it means synchronizers / Meta flops already present in the design are enough to deal with the metastability which may arise during functioning of the design.","PeriodicalId":270445,"journal":{"name":"2022 2nd International Conference on Intelligent Technologies (CONIT)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116376800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}