1,208 research outputs found

    RTL2RTL Formal Equivalence: Boosting the Design Confidence

    Full text link
    Increasing design complexity driven by feature and performance requirements and the Time to Market (TTM) constraints force a faster design and validation closure. This in turn enforces novel ways of identifying and debugging behavioral inconsistencies early in the design cycle. Addition of incremental features and timing fixes may alter the legacy design behavior and would inadvertently result in undesirable bugs. The most common method of verifying the correctness of the changed design is to run a dynamic regression test suite before and after the intended changes and compare the results, a method which is not exhaustive. Modern Formal Verification (FV) techniques involving new methods of proving Sequential Hardware Equivalence enabled a new set of solutions for the given problem, with complete coverage guarantee. Formal Equivalence can be applied for proving functional integrity after design changes resulting from a wide variety of reasons, ranging from simple pipeline optimizations to complex logic redistributions. We present here our experience of successfully applying the RTL to RTL (RTL2RTL) Formal Verification across a wide spectrum of problems on a Graphics design. The RTL2RTL FV enabled checking the design sanity in a very short time, thus enabling faster and safer design churn. The techniques presented in this paper are applicable to any complex hardware design.Comment: In Proceedings FSFMA 2014, arXiv:1407.195

    A Novel Beamformed Control Channel Design for LTE with Full Dimension-MIMO

    Get PDF
    The Full Dimension-MIMO (FD-MIMO) technology is capable of achieving huge improvements in network throughput with simultaneous connectivity of a large number of mobile wireless devices, unmanned aerial vehicles, and the Internet of Things (IoT). In FD-MIMO, with a large number of antennae at the base station and the ability to perform beamforming, the capacity of the physical downlink shared channel (PDSCH) has increased a lot. However, the current specifications of the 3rd Generation Partnership Project (3GPP) does not allow the base station to perform beamforming techniques for the physical downlink control channel (PDCCH), and hence, PDCCH has neither the capacity nor the coverage of PDSCH. Therefore, PDCCH capacity will still limit the performance of a network as it dictates the number of users that can be scheduled at a given time instant. In Release 11, 3GPP introduced enhanced PDCCH (EPDCCH) to increase the PDCCH capacity at the cost of sacrificing the PDSCH resources. The problem of enhancing the PDCCH capacity within the available control channel resources has not been addressed yet in the literature. Hence, in this paper, we propose a novel beamformed PDCCH (BF-PDCCH) design which is aligned to the 3GPP specifications and requires simple software changes at the base station. We rely on the sounding reference signals transmitted in the uplink to decide the best beam for a user and ingeniously schedule the users in PDCCH. We perform system level simulations to evaluate the performance of the proposed design and show that the proposed BF-PDCCH achieves larger network throughput when compared with the current state of art algorithms, PDCCH and EPDCCH schemes

    Improved Step Response of Power System Stabilizer using Fuzzy Logic Controller

    Get PDF
    As every power system is constantly being subjected to disturbances, we should see that these disturbances do not make the system unstable. Therefor additional signals derived from speed deviation, excitation deviation and accelerating power are injected into voltage regulators. The device to provide these signals is referred as power system stabilizer. The use of power system stabilizers has become very common in operation of large electric power systems. The conventional PSS which uses lead-lag compensation, where gain settings designed for specific operating conditions, is giving poor performance under different loading conditions. Therefore, it is very difficult to design a stabilizer that could present good performance in all operating points of electric power systems. In an attempt to cover a wide range of operating conditions, Fuzzy logic control has been suggested as a possible solution to overcome this problem. In this paper, a systematic approach to fuzzy logic control design is proposed. The study of fuzzy logic power system stabilizer for stability enhancement of a single machine infinite bus system is presented. In order to accomplish the stability enhancement, speed deviation and acceleration of the rotor synchronous generator are taken as the inputs to the fuzzy logic controller. These variables take significant effects on damping the generator shaft mechanical oscillations. The stabilizing signals were computed using the fuzzy membership function depending on these variables. The performance of the system with fuzzy logic based power system stabilizer is compared with the system having conventional power system stabilizer and system without power system stabilize

    A Study on Privacy Preserving in Big Data Mining Using Fuzzy Logic Approach

    Get PDF
    Information security is the most acclaimed issue when distributing individualinformation. It guarantees individual information distributing without revealing touchyinformation. The much well known methodology is K-Anonymity, where information is changedto comparability classes, each class having a set of K-records that are undefined from oneanother. Yet, a few creators have called attention to various issues with K-obscurity and haveproposed procedures to counter them or stay away from them. l-variety and t-closeness are suchprocedures to give some examples. Our examination has shown that this load of proceduresincrement computational work to for all intents and purposes infeasible levels, however theyincrement security. A couple of procedures represent a lot of data misfortune, whileaccomplishing security. In this paper, we propose a novel, comprehensive methodology foraccomplishing most extreme protection with no data misfortune and least overheads (as it werethe important tuples are changed). We address the information security issue utilizing fluffy setmethodology, an aggregate outlook change and another viewpoint of taking a gander atprotection issue in information distributing. Our basically possible strategy furthermore, permitscustomized protection safeguarding, and is valuable for both mathematical and all out ascribes
    corecore