1,208 research outputs found
RTL2RTL Formal Equivalence: Boosting the Design Confidence
Increasing design complexity driven by feature and performance requirements
and the Time to Market (TTM) constraints force a faster design and validation
closure. This in turn enforces novel ways of identifying and debugging
behavioral inconsistencies early in the design cycle. Addition of incremental
features and timing fixes may alter the legacy design behavior and would
inadvertently result in undesirable bugs. The most common method of verifying
the correctness of the changed design is to run a dynamic regression test suite
before and after the intended changes and compare the results, a method which
is not exhaustive. Modern Formal Verification (FV) techniques involving new
methods of proving Sequential Hardware Equivalence enabled a new set of
solutions for the given problem, with complete coverage guarantee. Formal
Equivalence can be applied for proving functional integrity after design
changes resulting from a wide variety of reasons, ranging from simple pipeline
optimizations to complex logic redistributions. We present here our experience
of successfully applying the RTL to RTL (RTL2RTL) Formal Verification across a
wide spectrum of problems on a Graphics design. The RTL2RTL FV enabled checking
the design sanity in a very short time, thus enabling faster and safer design
churn. The techniques presented in this paper are applicable to any complex
hardware design.Comment: In Proceedings FSFMA 2014, arXiv:1407.195
A Novel Beamformed Control Channel Design for LTE with Full Dimension-MIMO
The Full Dimension-MIMO (FD-MIMO) technology is capable of achieving huge
improvements in network throughput with simultaneous connectivity of a large
number of mobile wireless devices, unmanned aerial vehicles, and the Internet
of Things (IoT). In FD-MIMO, with a large number of antennae at the base
station and the ability to perform beamforming, the capacity of the physical
downlink shared channel (PDSCH) has increased a lot. However, the current
specifications of the 3rd Generation Partnership Project (3GPP) does not allow
the base station to perform beamforming techniques for the physical downlink
control channel (PDCCH), and hence, PDCCH has neither the capacity nor the
coverage of PDSCH. Therefore, PDCCH capacity will still limit the performance
of a network as it dictates the number of users that can be scheduled at a
given time instant. In Release 11, 3GPP introduced enhanced PDCCH (EPDCCH) to
increase the PDCCH capacity at the cost of sacrificing the PDSCH resources. The
problem of enhancing the PDCCH capacity within the available control channel
resources has not been addressed yet in the literature. Hence, in this paper,
we propose a novel beamformed PDCCH (BF-PDCCH) design which is aligned to the
3GPP specifications and requires simple software changes at the base station.
We rely on the sounding reference signals transmitted in the uplink to decide
the best beam for a user and ingeniously schedule the users in PDCCH. We
perform system level simulations to evaluate the performance of the proposed
design and show that the proposed BF-PDCCH achieves larger network throughput
when compared with the current state of art algorithms, PDCCH and EPDCCH
schemes
Improved Step Response of Power System Stabilizer using Fuzzy Logic Controller
As every power system is constantly being subjected to disturbances, we should see that these disturbances do not make the system unstable. Therefor additional signals derived from speed deviation, excitation deviation and accelerating power are injected into voltage regulators. The device to provide these signals is referred as power system stabilizer. The use of power system stabilizers has become very common in operation of large electric power systems. The conventional PSS which uses lead-lag compensation, where gain settings designed for specific operating conditions, is giving poor performance under different loading conditions. Therefore, it is very difficult to design a stabilizer that could present good performance in all operating points of electric power systems. In an attempt to cover a wide range of operating conditions, Fuzzy logic control has been suggested as a possible solution to overcome this problem. In this paper, a systematic approach to fuzzy logic control design is proposed. The study of fuzzy logic power system stabilizer for stability enhancement of a single machine infinite bus system is presented. In order to accomplish the stability enhancement, speed deviation and acceleration of the rotor synchronous generator are taken as the inputs to the fuzzy logic controller. These variables take significant effects on damping the generator shaft mechanical oscillations. The stabilizing signals were computed using the fuzzy membership function depending on these variables. The performance of the system with fuzzy logic based power system stabilizer is compared with the system having conventional power system stabilizer and system without power system stabilize
A Study on Privacy Preserving in Big Data Mining Using Fuzzy Logic Approach
Information security is the most acclaimed issue when distributing individualinformation. It guarantees individual information distributing without revealing touchyinformation. The much well known methodology is K-Anonymity, where information is changedto comparability classes, each class having a set of K-records that are undefined from oneanother. Yet, a few creators have called attention to various issues with K-obscurity and haveproposed procedures to counter them or stay away from them. l-variety and t-closeness are suchprocedures to give some examples. Our examination has shown that this load of proceduresincrement computational work to for all intents and purposes infeasible levels, however theyincrement security. A couple of procedures represent a lot of data misfortune, whileaccomplishing security. In this paper, we propose a novel, comprehensive methodology foraccomplishing most extreme protection with no data misfortune and least overheads (as it werethe important tuples are changed). We address the information security issue utilizing fluffy setmethodology, an aggregate outlook change and another viewpoint of taking a gander atprotection issue in information distributing. Our basically possible strategy furthermore, permitscustomized protection safeguarding, and is valuable for both mathematical and all out ascribes
- …