Spectrum Efficiency and BER Analysis of Massive MIMO Systems with QR-RLS Channel Estimation Technique
Research Paper | Journal Paper
Vol.7 , Issue.10 , pp.64-68, Oct-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i10.6468
Abstract
The fifth generation of mobile communication systems (5G) promises unprecedented levels of connectivity and quality of service (QoS) to satisfy the incessant growth in the number of mobile smart devices and the huge increase in data demand. One of the primary ways 5G network technology will be accomplished is through network densification, namely increasing the number of antennas per site and deploying smaller and smaller cells. Massive MIMO, where MIMO stands for multiple-input multiple-output, is widely expected to be a key enabler of 5G. This technology leverages an aggressive spatial multiplexing, from using a large number of transmitting/receiving antennas, to multiply the capacity of a wireless channel. Cell-free massive MIMO refers to a massive MIMO system where the BS antennas, herein referred to as access points (APs), are geographically spread out. The APs are connected, through a fronthaul network, to a central processing unit (CPU) which is responsible for coordinating the coherent joint transmission. Such a distributed architecture provides additional macro-diversity, and the co-processing at multiple APs entirely suppresses the inter-cell interference. In order to overcome the above effects, the work focuses on the QR-RLS based channel estimation method for cell free Massive MIMO systems.
Key-Words / Index Term
Massive MIMO, Channel State Information, Square Root-Recursive Least Square (QR-RLS)
References
[1] Supraja Eduru and Nakkeeran Rangaswamy, “BER Analysis of Massive MIMO Systems under Correlated Rayleigh Fading Channel”, 9th ICCCNT IEEE 2018, IISC, Bengaluru, India.
[2] H. Q. Ngo A. Ashikhmin H. Yang E. G. Larsson T. L. Marzetta "Cell-free massive MIMO versus small cells" IEEE Trans. Wireless Commun. vol. 16 no. 3 pp. 1834-1850 Mar. 2017.
[3] Huang A. Burr "Compute-and-forward in cell-free massive MIMO: Great performance with low backhaul load" Proc. IEEE Int. Conf. Commun. (ICC) pp. 601-606 May 2017.
[4] H. Al-Hraishawi, G. Amarasuriya, and R. F. Schaefer, “Secure communication in underlay cognitive massive MIMO systems with pilot contamination,” in In Proc. IEEE Global Commun. Conf. (Globecom), pp. 1–7, Dec. 2017.
[5] V. D. Nguyen et al., “Enhancing PHY security of cooperative cognitive radio multicast communications,” IEEE Trans. Cognitive Communication And Networking, vol. 3, no. 4, pp. 599–613, Dec. 2017.
[6] R. Zhao, Y. Yuan, L. Fan, and Y. C. He, “Secrecy performance analysis of cognitive decode-and-forward relay networks in Nakagami-m fading channels,” IEEE Trans. Communication, vol. 65, no. 2, pp. 549–563, Feb. 2017.
[7] W. Zhu, J. and. Xu and N. Wang, “Secure massive MIMO systems with limited RF chains,” IEEE Trans. Veh. Technol., vol. 66, no. 6, pp. 5455–5460, Jun. 2017.
[8] R. Zhang, X. Cheng, and L. Yang, “Cooperation via spectrum sharing for physical layer security in device-to-device communications under laying cellular networks,” IEEE Trans. Wireless Communication, vol. 15, no. 8, pp. 5651–5663, Aug. 2016.
[9] K. Tourki and M. O. Hasna, “A collaboration incentive exploiting the primary-secondary systems cross interference for PHY security enhancement,” IEEE J. Sel. Topics Signal Process., vol. 10, no. 8, pp. 1346–1358, Dec 2016.
[10] T. Zhang et al., “Secure transmission in cognitive MIMO relaying networks with outdated channel state information,” IEEE Access, vol. 4, pp. 8212–8224, Sep. 2016.
[11] Y. Huang et al., “Secure transmission in spectrum sharing MIMO channels with generalized antenna selection over Nakagami-m channels,” IEEE Access, vol. 4, pp. 4058–4065, Jul. 2016.
[12] Y. Deng et al., “Artificial-noise aided secure transmission in large scale spectrum sharing networks,” IEEE Trans. Communication, vol. 64, no. 5, pp. 2116–2129, May 2016.
[13] J. Zhu, R. Schober, and V. K. Bhargava, “Linear precoding of data and artificial noise in secure massive MIMO systems,” IEEE Trans. Wireless Communication, vol. 15, no. 3, pp. 2245–2261, Mar. 2016.
[14] K. Guo, Y. Guo, and G. Ascheid, “Security-constrained power allocation in MU-massive-MIMO with distributed antennas,” IEEE Trans. Wireless Commun., vol. 15, no. 12, pp. 8139–8153, Dec. 2016.
[15] Danda B. Rawat, “Evaluation Performance of Cognitive Radio Users in MIMO-OFDM based Wireless Networks”, IEEE Transaction of Wireless System, Vol. 32, Issue 07, IEEE 2016.
[16] H. Q. Ngo A. Ashikhmin H. Yang E. G. Larsson T. L. Marzetta "Cell-free massive MIMO: Uniformly great service for everyone" Proc. IEEE Int. Workshop Signal Process. Adv. Wireless Commun. (SPAWC) pp. 201-205 Jun. 2015
[17] E. Nayebi A. Ashikhmin T. L. Marzetta H. Yang "Cell-free massive MIMO systems" Proc. 49th Asilomar Conf. Signals Syst. Comput. pp. 695-699 Nov. 2015.
[18] Shan Jin and Xi Zhang, “Compressive Spectrum Sensing for MIMO-OFDM Based Cognitive Radio Networks”, 2015 IEEE Wireless Communications and Networking Conference (WCNC), Applications, and Business, Vol. 27, No. 2, pp. 567-572, 2015.
[19] H. Q. Ngo A. Ashikhmin H. Yang E. G. larsson T. L. Marzetta "Cell-Free Massive MIMO: Uniformly great service for everyone" Proc. 16th Int Workshop Signal Process. Ad If Wireless Commun. (SPAWC) pp. 201-205 Jun. 2015.
Citation
Tamanna Rajput, Munna Lal Jatav, "Spectrum Efficiency and BER Analysis of Massive MIMO Systems with QR-RLS Channel Estimation Technique," International Journal of Computer Sciences and Engineering, Vol.7, Issue.10, pp.64-68, 2019.
Performance Analysis of 5G MIMO-OFDM Systems in Wireless Communications using Modified PTS Scheme
Research Paper | Journal Paper
Vol.7 , Issue.10 , pp.69-73, Oct-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i10.6973
Abstract
Orthogonal frequency division multiplexing (OFDM) is one of such popular method for achieving this high information rate. OFDM has several advantages, but one of the main drawbacks is its high peak-to-average power ratio (PAPR). However, the challenging part is that most of the PAPR reduction schemes come with high computational complexity. Recent PAPR reduction techniques such as partial transmit sequence (PTS) has been considered as most popular for PAPR reduction. This research work explores to find a solution for the PAPR reduction by using PTS technique, which has been implemented by using sub-blocks partitioning. In sub-block partition consists of OFDM data frame which is partitioned into several sub-blocks. An adjacent partitioning (AP) method can be perceived as the best of the existing partitioning method when the cost and PAPR reduction performance are considered together. In this paper a new partial transmit sequence (PTS) technique, based on PTS with discrete wavelet transform (DWT) and discrete cosine transform (DCT) technique, for two antennas MIMO-OFDM system, is proposed which can achieve better PAPR performance at much less bit error rate (BER). Simulation results show that the proposed approach can reduce BER and achieve a better PAPR reduction compared to previous PTS technique.
Key-Words / Index Term
PTS, DWT, DCT, MIMO-OFDM, PAPR, BER
References
[1] Tanairat Mata, Pisit Boonsrimuang and Pitchaya Boontra, “A PAPR Reduction Scheme based on Improved PTS with ABC Algorithm for OFDM Signal”, 2018 15th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology.
[2] Thana Udomsripaiboon, “Adjustable Dynamic Range for PAPR Clipping Technique in Large-Scale MIMO-OFDM Systems”, 15th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-NCON2018).
[3] Junhui Zhao, Shanjin Ni and Yi Gong, “Peak-to-Average Power Ratio Reduction of FBMC/OQAM Signal Using a Joint Optimization Scheme”, Received March 24, 2017, accepted April 26, 2017, date of publication May 19, 2017, date of current version August 29, 2017.
[4] Ashna Kakkar,Sai Nitesh Garsha,Ojasvi Jain and Kritika, “Improvisation in BER and PAPR by using hybrid reduction techniques in MIMO-OFDM employing channel estimation techniques”, 2017 IEEE 7th International Advance Computing Conference.
[5] S. H. Han, J.H. Lee, “ An Overview of Peak Average Power ratio Reduction techniques for Multicarrier Transmission”, IEEE wireless Communications, Vol. 25, pp. 56-65, March, 2005H.
[6] H. Yang, “A Road to Future Broadband Wireless Access: MIMOOFDM based Air Interface, “IEEE Communications Magazine, Vol. 43, No. 1, pp.53-60, 2005.
[7] Tarokh, N. Seshadri, and A. R. Caderbank, “ SPACE-TIME Codes for High Data Rate Wireless Communication: Performance Criteria and Code Construction,” IEEE Trans. Inform. Theory, pp. 744-764, Mar. 1988.
[8] H. Ochiai and H. Imai. Performance of the deliberate clipping with adaptive symbol selection for strictly band-limited OFDM systems. IEEE Journals on Selected Areas in Communications, 18(11) :2270–2277, November 2000.
[9] Jose Tellado. Peak to Average Power Ratio Reduction for Multicarrier Modulation. PhD thesis, University of Stanford, Stanford, 1999.
[10] Tao Jiang and Guangxi Zhu. Nonlinear companding transform for reducing peak-to average power ratio of OFDM signals. Broadcasting, IEEE Transactions on, 50(3):342 – 346, sept. 2004.
[11] S. B. Slimane. Reducing the peak-to-average poser ratio of OFDM signal through precoding. IEEE Trans Vehicular Technology, 56(2) 686–695, mar 2007.
[12] R.W. Bauml, R.F.H. Fisher and J.B. Huber, Reducing the peak-to average power ratio of multicarrier modulation by selected mapping[J] IEEE Electronic Letter, 1996, 32(22): 2056-2057.
[13] S.H. Muller and J.B. Huber, OFDM with reduced peak-to-average power ratio by optimum combination of partial transmit sequences [J]. IEEE Electronic Letter, 1997, 33(5): 368-369.
[14] L. Yang, K. K. Soo, S. li, and Y. M. SU, ``PAPR Reduction Using Low Complexity PTS to Construct of OFDM Signals Without Side Information``, IEEE Transactions on Broadcasting, Vol. 57, No. 2, June 2011.
[15] D.W Lim, S.J.Heo and J.S.No, A new PTS OFDM scheme with low complexity for PAPR reduction [J]. IEEE Transactions on Broadcasting, 2006, 52(1): 77-82.
[16] P. Mukunthan and, P Dananjayan," PAPR Reduction based on a Modified PTS with Interleaving and Pulse Shaping method for STBC MIMO-OFDM System", IEEE ICCCNT`12 , 26th _28th July 2012, Coimbatore, India.
Citation
Pooja Gautam, Munna Lal Jatav, "Performance Analysis of 5G MIMO-OFDM Systems in Wireless Communications using Modified PTS Scheme," International Journal of Computer Sciences and Engineering, Vol.7, Issue.10, pp.69-73, 2019.
Energy Efficiency of Microprocessor
Research Paper | Journal Paper
Vol.7 , Issue.10 , pp.74-76, Oct-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i10.7476
Abstract
In the microprocessor industry we see that energy efficiency is one-off the main issues that we are faced with.The motivation for our paper is the increased applications which use embedded systems for communication and multimedia. In our paper you will see the changes in techniques that have made a considerable amount of development to make sure that the efficiency of the microprocessor consumes will be less but also not compromise with the performance (clock speed) that it provides to the users. Internet connectivity has caused the devices to be in use all day long because of this the rate at which the microprocessor runs uses great amount of energy because of which energy efficiency has to be good. Ever since caches were introduced they present the most attractive ways for power reduction. To implement coherent caches using MESI protocol we use snoop filtering mechanism.
Key-Words / Index Term
Energy, CMOS, Cache, Snoop Filtering
References
[1] T. D. Burd and R. W. Brodersen, "Energy efficient CMOS microprocessor design," Proceedings of the Twenty-Eighth Annual Hawaii International Conference on System Sciences, Wailea, HI, USA, 1995, pp. 288-297 vol.1.
doi: 10.1109/HICSS.1995.375385
[2]. Kin, Munish Gupta and W. H. Mangione-Smith, "The filter cache: an energy efficient memory structure," Proceedings of 30th Annual International Symposium on Microarchitecture, Research Triangle Park, NC, USA, pp.184-193 doi: 10.1109/MICRO.1997.645809
[3] A. Patel and K. Ghose, "Energy-efficient MESI cache coherence with pro-active snoop filtering for multicore microprocessors," Proceeding of the 13th international symposium on Low power electronics and design (ISLPED `08), Bangalore, 2008, pp. 247-252.
doi: 10.1145/1393921.1393988
[4] Tiwari, R. Sam and S. Shaikh, "Analysis and prediction of churn customers for telecommunication industry," 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, 2017, pp. 218-222. doi: 10.1109/I-SMAC.2017.8058343
[5] S. Navadia, P. Yadav, J. Thomas and S. Shaikh, "Weather prediction: A novel approach for measuring and analyzing weather data," 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, 2017, pp. 414-417. doi: 10.1109/I-SMAC.2017.8058382
[6] S. Shaikh, S. Rathi and P. Janrao, "IRuSL: Image Recommendation Using Semantic Link," 2016 8th International Conference on Computational Intelligence and Communication Networks (CICN), Tehri, 2016, pp. 305-308. doi: 10.1109/CICN.2016.66
[7] S. Shaikh, S. Rathi and P. Janrao, "Recommendation System in E-Commerce Websites: A Graph Based Approached," 2017 IEEE 7th International Advance Computing Conference (IACC), Hyderabad, 2017, pp. 931-934. doi: 10.1109/IACC.2017.0189
[8] A. Fasiku, AyodejiIreti, B. Olawale, JimohBabatunde, C. AbiolaOluwatoyin B., "Comparison of Intel Single-Core and Intel Dual-Core Processor Performance", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.1-9, 2013
[9] M. Sora, J. Talukdhar, S. Majumder, P.H Talukdhar, U.Sharmah, "Word level detection of Galo and Adi language using acoustical cues", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.10-13, 2013
[10] Manish Mishra, Piyush Shukla, Rajeev Pandey, "Assessment on different tools used for Simulation of routing for Low power and lossy Networks(RPL)", International Journal of Scientific Research in Network Security and Communication, Vol.7, Issue.4, pp.26-32, 2019
Citation
Husain Unwala, Sairaj Shetye, Abhishek Yadav, Shakila Shaikh, Shiburaj Pappu, "Energy Efficiency of Microprocessor," International Journal of Computer Sciences and Engineering, Vol.7, Issue.10, pp.74-76, 2019.
Virtual Assistance Using Chatbots
Research Paper | Journal Paper
Vol.7 , Issue.10 , pp.77-80, Oct-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i10.7780
Abstract
In the recent era of technology, chatbots is the next big thing in the epoch of conversational services. It acts as the ultimate virtual assistant for completing various tasks ranging from answering queries, getting driving directions, turning up the thermostat in smart home, to playing one’s favorite tunes etc. Whenever faced with unchartered territories humans have a tendency to get anxious and it is but natural- and even more so in the case of students who are about to join a new course. They are always filled with endless queries and mostly all of them are similar across people. Rather than flooding a single person with all those and to answer them over and over again, it is apt to segregate usual common queries and their solutions at a single place which is easily accessible by all. In this paper an efficient Chabot is designed based on neural network, which provides an accurate answer for any query based on the dataset of FAQs. This Chabot can be used by Sree Chitra Thirunal College of Engineering to answer frequently asked questions to curious students in an interactive fashion. The accuracy of the bot was noted to be 0.78 with a loss of 2.06.
Key-Words / Index Term
Artificial Intelligence, NLP, ML
References
[1] C.B.Lee, H. N, "Chatbots and Conversational Agents: A Bibliometric Analysis", IEEE International Conference on Industrial Engineering and Engineering Management, 2017.
[2] Thomas N T Amrita, “ An E-business Chatbot using AIML and LSA”, Intl. Conference on Advances in Computing, Communications and Informatics, 2016.
[3] A M Rahman, Abdullah Al Mamun, Alma Islam, "Programming challenges of Chatbot: Current and Future Prospective" ,IEEE International Islamic University Chittagong, 2016.
[4] BayuSetiaji, Ferry WahyuWibowo , "Chatbot Using A Knowledge in Database Human-to-Machine Conversation Modeling" International Conference on Intelligent Systems, Modelling and Simulation, 2016.
[5] Bhavika R. RanoliyaNidhiRaghuwanshi, Sanjay Singh Department of Information and Communication Technology Manipal University, "Chatbot for University Related FAQs" , International Conference on Advances in Computing, Communications and Informatics, 2017.
[6] Eric Grigori, "Evaluation of Modern Tools for an OMSCS Advisor Chatbot" Georgia Institute of Technology Atlanta, 2017.
[7] Luis Fernando D’Haro and Rafael E. Banchs, "Learning to predict the adequacy of answers in chat oriented human agent dialogs" IEEE Region 10 Conference (TENCON), Malaysia, 2017.
Citation
Kavitha K V, Athira S Pillai, Disha Dinesh Majithia, "Virtual Assistance Using Chatbots," International Journal of Computer Sciences and Engineering, Vol.7, Issue.10, pp.77-80, 2019.
An Edge Based Technique for Spatially Varying Defocus Blur Estimation of Image using Gradient Magnitudes - Simulation & Result
Research Paper | Journal Paper
Vol.7 , Issue.10 , pp.81-89, Oct-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i10.8189
Abstract
The article presents a new edge based technique for spatially varying defocus blur estimation with the use of a single image based on reblurred gradient magnitudes. Objects that do not lie at the focal length of a digital camera generate defocused regions in the captured image. Also inherent dynamic features of the nature gives rise to blur in captured image. Whenever there is relative motion between the image to be captured and the imaging system, the image captured at that movement is also suffered by blur. A locally adaptive scheme for obtaining the reblur scales, a connected edge filter for regularizing sparse map, and usingfast guided filter for blur map propagation is recommonded and simulated on Matlab. Results are compared and find to be performing better in comparison with the older adopted methods.
Key-Words / Index Term
Edge based technique, Blur estimation, Image processing, Gradient magnitude
References
[1] A M Deshpande, S Patnaik, "Single image motion deblurring: An accurate PSF estimation and ringing reduction[J]", Optik-International Journal for Light and Electron Optics, vol. 125, no. 14, pp. 3612-3618, 2014.
[2] N. Phansalkar, "Determination of linear motion point spread function using hough transform for image restoration," in Proc. 2010 IEEE Int. Conf. Computational Intelligence and Computing Research, Coimbatore, India, 2010, pp. 211-224.
[3] L. Yuan, J. Sun, L.Quan, and H. Y. Shum, "Image deblurring with blurred/noisy image pairs," ACM Trans. Graphics, vol. 26, article no. 1, 2007, pp:120-129.
[4] Q. Shan, J. Jia, A. Agarwal, "High-quality motion deblurring from a single image," ACM Trans. on Graphics, vol. 27, article no. 73, 2008, pp:1130-1145
[5] M. Cannon, "Blind deconvolution of spatially invariant image blurs with phase," IEEE Trans. Acoust. Speech Signal Process., vol. 24, pp. 56-63, 1976.
[6] M. M. Chang, A. M. Tekalp, and A. T. Erdem, "Blur identification using the bispectrum," IEEE Trans. Signal Process., vol. 39, pp. 2323-2325, 1991.
[7] J. Biemond, R. L. Lagendijk, and R. M. Mersereau, "Iterative methods for image deblurring," Proc. of the IEEE, vol. 78, pp. 856-883, 1990.
[8] C. Mayntz, T. Aach, and D. Kunz, "Blur identification using a spectral inertial tensor and spectral zeros," IEEE image Process., vol. 2, pp. 885-889, 1999.
[9] F. Krahmer, Y. Lin, B. Mcadoo, K. Ott, J. Wang, D. Widemann, and B. Wohlberg, "Blind image deconvolution: Motion blur estimation," IMA Preprints Series, 2006.
[10] N. Norouzi, and M. E. Moghaddam, "Motion blur identification using image derivative," in Proc. 2008 IEEE Int. Conf. Signal Processing and Information Technology, Sarajevo, Yugoslavia, 2008, pp. 380-384.
[11] M. E. Moghaddam, and M. Jamzad, "Motion blur identification in noisy images using mathematical models and statistical measures," Pattern Recognition, vol. 40, pp. 1946-1957, 2007. pp:1921-1934
[12] R. Dash, P. K. Sa, and B. Majhi, "RBFN based motion blur parameter estimation," in Proc. 2009 IEEE Int. Conf. Advanced Computer Control, Singapore, Singapore, 2009, pp. 327-331.
[13] C. C. Liebe, "Accuracy performance of star trackers-a tutorial", IEEE Trans. Aerosp. Electron. Syst., vol. 38, no. 2, pp. 587-599, 2002.
[14] T Sun, F Xing, Z You et al., "Smearing model and restoration of star image under conditions of variable angular velocity and long exposure time [J]", Optics express, vol. 22, no. 5, pp. 6009-6024, 2014
[15] T Sun, F Xing, Z You et al., "Motion-blurred star acquisition method of the star tracker under high dynamic conditions [J]", Optics express, vol. 21, no. 17, pp. 20096-20110, 2013.
[16] M Dobes, L Machala, T Fürst, "Blurred image restoration: A fast method of finding the motion length and angle[J]", Digital Signal Processing, vol. 20, no. 6, pp. 1677-1686, 2010.
[17] "Pattern analysis with two-dimensional spectral localization: Applications of two-dimensional S transforms" by L. Mansinha R. G. Stockwell , R. P. Lowe in Physica A vol. 239 pp. 286-295 IEEE-2017
[18] "Space-local spectral texture map based on MR images of MS patients" by H. Zhu, Mayer, Mansinha L. A, Law C. J. Archibald, Luanne J. R in Mitchell MS: Clin. Lab. Res. IEEE-2018
[19] W Hou, H Liu, Z Lei et al., "Smeared star spot location estimation using directional integral method [J]", Applied optics, vol. 53, no. 10, pp. 2073-2086, 2014.
[20] T Sun, F Xing, Z You et al., "Smearing model and restoration of star image under conditions of variable angular velocity and long exposure time [J]", Optics express, vol. 22, no. 5, pp. 6009-6024, 2014.
Citation
Syed Faraz Ahmed Naqvi, Kamal Niwaria, Bharti Chourasia, "An Edge Based Technique for Spatially Varying Defocus Blur Estimation of Image using Gradient Magnitudes - Simulation & Result," International Journal of Computer Sciences and Engineering, Vol.7, Issue.10, pp.81-89, 2019.
Reference Model for Effective Performance and Availability Monitoring in Large Scale Software Systems
Research Paper | Journal Paper
Vol.7 , Issue.10 , pp.90-97, Oct-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i10.9097
Abstract
The monitoring of different parts of the software stack is essential for ensuring acceptable performance and availability of large scale heterogeneous software systems. However, given that a large amount of data is generated by various parts of the software stack, identifying the minimum set of data elements for inclusion under the initial monitoring umbrella is challenging. Although the elements are similar across the majority of the projects, we have seen that teams often spend considerable effort and time in identifying them. In this paper, we present a layered monitoring reference model, with different layers targeting different parts of the software stack using appropriate data elements. The model provides guidance on the minimum set of data elements, drawing on learnings from more than 20 real-life projects. The model also explains the data elements and the motivation for including them in the model.
Key-Words / Index Term
System monitoring, Production systems, Performance monitoring, Availability monitoring
References
[1] T.H.D. Nguyen, B. Adams, Z. M. Jiang, A. E. Hassan, M. Nasser, P. Flora, “Automated Detection of Performance Regressions Using Statistical Process Control Techniques”, In the Proceedings of the 3rd ACM/SPEC International Conference on Performance Engineering, USA, pp. 299–310, 2012.
[2] H. M. Alghmadi, M. D. Syer, W. Shang, A. E. Hassan, “An Automated Approach for Recommending When to Stop Performance Tests”, In the Proceedings of the IEEE International Conference on Software Maintenance and Evolution, USA, pp. 279-289, 2016.
[3] S. Ghaith, M. Wang, P. Perry, Z. M. Jiang, P. O’Sullivan, J. Murphy, “Anomaly detection in performance regression testing by transaction profile estimation”, Journal of Software Testing, Verification and Reliability. Vol. 26, Issue. 1, pp. 4–39, 2016.
[4] H. Malik, H. Hemmati, A. E. Hassan, “Automatic detection of performance deviations in the load testing of Large Scale Systems”, In the Proceedings of the International Conference on Software Engineering, USA, pp. 1012-1021, 2013
[5] M. Acharya, V. Kommineni, “Mining Health Models for Performance Monitoring of Services”, In the Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, New Zealand, pp. 409–420, 2009.
[6] S. Iwata, Kono, K, “Narrowing Down Possible Causes of Performance Anomaly in Web Applications”, In the Proceedings of Dependable Computing Conference, USA, pp. 185–190, 2010.
[7] I. Trubin, “Capturing workload pathology by statistical exception detection systems”, In the Proceedings of International Computer Measurement Group Conference, USA, 2005.
[8] L. M. Silva, J. P. Magalhães, “Detection of Performance Anomalies in Web-Based Applications”, In the Proceedings of IEEE International Symposium on Network Computing and Applications, USA, pp. 60-67, 2010.
[9] L. Cherkasova, K. Ozonat, N. Mi, J. Symons, E. Smirni, “Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change”, In the Proceedings of the IEEE International Conference on Dependable Systems and Networks With FTCS and DCC, USA, pp. 452-461, 2008.
[10] N. Mi, L. Cherkasova, K. Ozonat, J. Symons, E. Smirni, “Analysis of application performance and its change via representative application signatures”, In the Proceedings of IEEE Network Operations and Management Symposium, Brazil, pp. 216–223, 2008.
[11] Z.M. Jiang, A.E. Hassan, “A Survey on Load Testing of Large-Scale Software Systems”, IEEE Transactions on Software Engineering. Vol. 41, No. 11, pp. 1091–1118, 2015.
[12] F.M. Bereznay, “Did something change? using statistical techniques to interpret service and resource metrics”, In the Proceedings of the International Computer Measurement Group Conference, USA, 2006.
[13] Shen-Shyang Ho, “A martingale framework for concept change detection in time-varying data streams”, In the Proceedings of international conference on Machine learning, Germany, pp. 321-327, 2005.
[14] D. T. Shipmon, J. M. Gurevitch, P. M. Piselli, S. T. Edwards, “Time Series Anomaly Detection; “Detection of anomalous drops with limited features and sparse examples in noisy highly periodic data”, Vol. abs/1708.03665, CoRR, 2017.
[15] Dheeraj, K. Sharma, “Proposed 4S Quality Metrics and Automated Continuous Quality (ACQ) Metrics Dashboard to Quantify Software Product Quality”, International Journal of Computer Sciences and Engineering, Vol. 7, Issue. 1, pp.865-869, 2019.
[16] A. Agarwal, A. Dixit, “Progressive Web Applications: Architectural Structure and Service Worker Asset Caching”, International Journal of Computer Sciences and Engineering, Vol. 7, Issue. 9, pp. 127-139, 2019.
Citation
Raghu Ramakrishnan, Arvinder Kaur, "Reference Model for Effective Performance and Availability Monitoring in Large Scale Software Systems," International Journal of Computer Sciences and Engineering, Vol.7, Issue.10, pp.90-97, 2019.
Review on 40 Pins Microcontroller 8051
Research Paper | Journal Paper
Vol.7 , Issue.10 , pp.98-101, Oct-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i10.98101
Abstract
A microcontroller can be considered a self -contained system with a processor ,memory and peripherals and can be used as an embedded system .The majority of microcontrollers in use today are embedded in other machinery, such as automobiles , telephones , appliances and peripherals for computer systems .Mixed signal microcontrollers are common integrating analog components needed to control non digital systems In the context in the internet of things, microcontrollers are economical and popular means of data collection, sensing and actuating the physical world as edge devices.
Key-Words / Index Term
memory; microcontroller; architecture
References
[1] Donal Heffernan,”8051 Microprocessor” University of Limeric, May-2002
[2] Arduino Embedded Technologies, “An Encyclopedia Coverage of Compiler’s, Programmer’s & Simulator’s for 8051, PIC, AVR”.
[3]MacKenzieScott,”The8051Microcontroller, Prentice Hall. 3rd. Ed.,” 1999.
[4] Yeralan and Ahluwalia.” Programming and Interfacing the 8051 Microcontroller, Addison-Wesley”, 1995.
[5]8052 tutorial information by Vault Information Services: http://www.8052.com
[6]Intel’s site for 8051 based products: http://developer.intel.com/design/mcs51/
[7]Philips’ site for 8051 based products: http://www-us.semiconductors.philips.com/microcontrol/
[8]8051 Microprocessor. https://en.wikibooks.org
[9] Introduction to 8051 Microcontroller - The Engineering Project-https://www.theengineeringprojects.com/2018/06/introduction-to-8051-microcontroller.html
[10] 8051 Microcontroller Architecture - javatpoint https://www.javatpoint.com/embedded-system-8051-microcontroller-architecture [11] Tiwari, R. Sam and S. Shaikh, "Analysis and prediction of churn customers for telecommunication industry," 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, 2017, pp. 218-222. doi: 10.1109/I-SMAC.2017.8058343
[12] S. Navadia, P. Yadav, J. Thomas and S. Shaikh, "Weather prediction: A novel approach for measuring and analyzing weather data," 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, 2017, pp. 414-417. doi: 10.1109/I-SMAC.2017.8058382
[13] S. Shaikh, S. Rathi and P. Janrao, "IRuSL: Image Recommendation Using Semantic Link," 2016 8th International Conference on Computational Intelligence and Communication Networks (CICN), Tehri, 2016, pp. 305-308. doi: 10.1109/CICN.2016.66
[14] S. Shaikh, S. Rathi and P. Janrao, "Recommendation System in E-Commerce Websites: A Graph Based Approached," 2017 IEEE 7th International Advance Computing Conference (IACC), Hyderabad, 2017, pp. 931-934. doi: 10.1109/IACC.2017.0189
[15] A. Fasiku, Ayodeji Ireti, B. Olawale, Jimoh Babatunde, C. Abiola Oluwatoyin B., "Comparison of Intel Single-Core and Intel Dual-Core Processor Performance", International
Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.1-9, 2013
[16] M. Sora, J. Talukdhar, S. Majumder, P.H Talukdhar, U. Sharmah, "Word level detection of Galo and Adi language using acoustical cues", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.1, pp.10-13, 2013
[17] Manish Mishra, Piyush Shukla, Rajeev Pandey, "Assessment on different tools used for Simulation of routing for Low power and lossy Networks (RPL)", International Journal of Scientific Research in Network Security and Communication, Vol.7, Issue.4, pp.26-32, 2019
Citation
Prachi Dukale, Sanjana Lad, Taskeen Merchant, Gaurav Rane, Aman Qureshi, Abdul Ahad Khan, Shakila Shaikh, Shiburaj Pappu, "Review on 40 Pins Microcontroller 8051," International Journal of Computer Sciences and Engineering, Vol.7, Issue.10, pp.98-101, 2019.
Review Paper on Hybrid Wind-Solar Energy System Renewable Energy Sources System
Review Paper | Journal Paper
Vol.7 , Issue.10 , pp.102-106, Oct-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i10.102106
Abstract
Now a day’s electricity is most needed facility for the human being. All the conventional energy resources are depleting day by day. So we have to shift from conventional to non-conventional energy resources. In this the combination of two energy assets is happens i.e. wind and sunlight based energy. This procedure castigates the reasonable energy assets without harming the nature. We can give continuous power by utilizing half and half energy framework. Basically this system involves the integration of two energy system that will give continuous power. Sun based boards are utilized for changing over sunlight based energy and wind turbines are utilized for changing over breeze energy into power. This electrical power can use for different reason. Age of power will be happens at moderate cost. This paper manages the age of power by utilizing two sources consolidate which prompts produce power with moderate cost without harming the nature adjust.
Key-Words / Index Term
Fuel cell, Photovoltaic, Wind energy conversion, Wind Turbines
References
[1] Joanne Hui, Alireza Bakhshai, and Praveen K. Jain, “A Hybrid Wind-Solar Energy System: A New Rectifier Stage Topology,” IEEE Conference, February 2010.
[2] Trishan Esram, and Patrick L. Chapman, “Comparison of Photovoltaic Array Maximum Power Point Tracking Technique,” IEEE Trans. on energy conversion, vol. 22, no. 2, june 2007.
[3] [Cody A. Hill, Matthew Clayton Such, Dongmei Chen, Juan Gonzalez, and W.Mack Grady, “Battery Energy Storage for Enabling Integration of Distributed Solar Power Generation,” IEEE Transactions on smart grid, vol. 3, no. 2, June 2012.
[4] Hao Qian, Jianhui Zhang and Jih-Sheng Lai, “a grid-tie battery energy storage system,” IEEE Conference, June 2010.
[5] Sharad W. Mohod, and Mohan V. Aware, “Micro Wind Power Generator With Battery Energy Storage For Critical Load,” IEEE systems journal, vol. 6, no. 1, march 2012
[6] S.K. Kim, J.H Jeon, C.H. Cho, J.B. Ahn, and S.H. Kwon, “Dynamic Modeling and Control of a Grid-Connected Hybrid Generation System with Versatile Power Transfer,” IEEE Transactions on Industrial Electronics, vol. 55, pp. 1677-1688, April 2008.
[7] Nabil A, Ahmed and Masafumi Miyatake, “A Stand – Alone Hybrid Generation System Combining Solar Photovoltaic and Wind Turbine with Simple Maximum Power Point Tracking Control,” IEEE Conference, August 2006.
[8] S. Jain, and V. Agarwal, “An Integrated Hybrid Power Supply for Distributed Generation Applications Fed by Nonconventional Energy Sources,” IEEE Transactions on Energy Conversion, vol. 23, June 2008.
[9] Matthew Clayton Such, Cody Hill, “Battery Energy Storage and Wind Energy Integrated into the Smart Grid,” IEEE Conference, January 2012.
[10] Hao Qian, Jianhui Zhang, Jih-Sheng (Jason) Lai,Wensong Yu, “A High-Efficiency Grid-Tie Battery Energy Storage System,” IEEE transactions on power electronics, vol. 26, no. 3, march 2011
[11] Niraj Garimella and Nirmal-Kumar C. Nair, “Assessment of Battery Energy Storage Systems for Small-Scale Renewable Energy Integration,” IEEE Conference, January 2009.
[12] Dezso Sera, Tamas Kerekes, Remus Teodorescu and Frede Blaabjerg, “Improved MPPT Algorithms for Rapidly Changing Environmental Conditions,” IEEE Conference, September 2006.
Citation
Pankaj Kumar Mahto, Manish Kethoriya, "Review Paper on Hybrid Wind-Solar Energy System Renewable Energy Sources System," International Journal of Computer Sciences and Engineering, Vol.7, Issue.10, pp.102-106, 2019.
Fingerprint Template Protectionsthrough Various Pattern Transformation Approaches: A Review
Review Paper | Journal Paper
Vol.7 , Issue.10 , pp.107-110, Oct-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i10.107110
Abstract
Biometric Templates are majorly used as an authentication and identification metric of a person in different industries. The Biometric templates are generated through various mechanisms like key, index and transformation based. This paper focuses on a study of fingerprint Biometric and various existing pattern transformation approaches based on fingerprint.
Key-Words / Index Term
Biometrics, Cancellable Templates, Fingerprint
References
[1] Dr. E. Chandra, K. Kanagalakshmi . (2011). Noise Elimination in Fingerprint Image Using Median Filter. Int. J. Advanced Networking and Applications (0975 – 8887) Volume: 02, Issue: 06, Pages: 950-955.
[2] Fingerprint Analysis and Representation (2003). In: Handbook of Fingerprint Recognition. Springer Professional Computing. Springer, New York.
[3] Cavoukian, Ann. "Privacy by design: origins, meaning, and prospects for assuring privacy and trust in the information era." Privacy protection measures and technologies in business organizations: aspects and standards. IGI Global, 2012. 170-208.
[4] Sadhya, Debanjan, and Sanjay Kumar Singh. "Privacy preservation for soft biometrics based multimodal recognition system." Computers & Security 58 (2016): 160-179.
[5] Z. Jin, M. Lim, A. B. J. Teoh, B. Goi and Y. H. Tay, "Generating Fixed-Length Representation From Minutiae Using Kernel Methods for Fingerprint Authentication," in IEEE Transactions on Systems, Man, and Cybernetics: Systems, vol. 46, no. 10, pp. 1415-1428, Oct. 2016.
[6] Dr. E. Chandra, K. Kanagalakshmi. (2014, March). Novel Shift-Phase Transformation based Cancelable and Irrevocable Biometric Template Generation for Fingerprints. International Journal of Computer Applications (0975 – 8887) Volume 89 – No 20.
[7] Jianjiang Feng, Jie Zhou, Proposed, “Orientation Field Estimation for Latent Fingerprint Enhancement” IEEE Trans, pattern anal, and machine intelligence, Vol. 35, no. 4, pp. 925-939, April 2013.
[8] T. H. Nguyen, Y. Wang, Y. Ha and R. Li, "Performance and security-enhanced fuzzy vault scheme based on ridge features for distorted fingerprints," in IET Biometrics, vol. 4, no. 1, pp. 29-39, 3 2015.
[9] Dr. E. Chandra, K. Kanagalakshmi. (2011, April) "Performance evaluation of filters in noise removal of fingerprint image," 2011 3rd International Conference on Electronics Computer Technology, Kanyakumari, 2011, pp. 117-121
[10] Li.S. and KotA. C., “Privacy protection from fingerprint database,” IEEE Signal Process. Let., Vol. 18, no. 2, pp. 115–118, Feb. 2011.
[11] L. Ghammam, M. Barbier and C. Rosenberger, "Enhancing the Security of Transformation Based Biometric Template Protection Schemes," 2018 International Conference on Cyberworlds (CW), Singapore, 2018, pp. 316-323.
[12] RathaN. K., ChikkerurS., ConnellJ. H., and BolleR. M., “Generating cancelable fingerprint templates,” IEEE Trans. Pattern Anal. Mach.Intell., Vol. 29, no. 4, pp. 561–72, Apr. 2007.
[13] RossA. and OthmanA., “Mixing fingerprints for template security and privacy,” Proc. 19th Eur. Signal Proc. Conf. (EUSIPCO), Barcelona, Spain, Aug. 29–Sep. 2, 2011.
[14] Sheng Li, Student Member, IEEE, and Alex C. Kot, Fellow, Fingerprint Combination for Privacy Protection IEEE Transactions on information forensics and security, Vol. 8, no. 2, pp. 350-360, February 2013.
[15] E. Liu and K. Cao, "Minutiae Extraction From Level 1 Features of Fingerprint," in IEEE Transactions on Information Forensics and Security, vol. 11, no. 9, pp. 1893-1902, Sept. 2016
[16] D. M. Sabah, D. A. A. Majeed and H. S. Hatem, "Implementation of Secure Biometric System Based on Energy properties of Fingerprint image to select Blocks for Data Hiding Algorithm," 2018 Al-Mansour International Conference on New Trends in Computing, Communication, and Information Technology (NTCCIT), Baghdad, Iraq, 2018, pp. 48-50
[17] S. M. T. Toapanta, A. A. C. Cruz, L. E. M. Gallegos and J. A. O. Trejo, "Algorithms for Efficient Biometric Systems to Mitigate the Integrity of a Distributed Database," 2018 International Conference on Computer, Information and Telecommunication Systems (CITS), Colmar, 2018, pp. 1-5
[18] X. Dong, Z. Jin and K. Wong, "A Generalized Approach for Cancellable Template and Its Realization for Minutia Cylinder-Code," 2018 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference (APSIPA ASC), Honolulu, HI, USA, 2018, pp. 908-915.
[19] B. Yan and L. You, "A novel public key encryption model based on transformed biometrics," 2017 IEEE Conference on Dependable and Secure Computing, Taipei, 2017, pp. 424-428.
[20] B. O. Mohammed and S. M. Shamsuddin, "Feature level Fusion for Multi-biometric with identical twins," 2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE), Shah Alam, 2018, pp. 1-6.
[21] Z. Li, W. Lei and W. Zhang, "Improvement for distortion resistance of Delaunay triangulation net-based fingerprint templates," in IET Biometrics, vol. 8, no. 5, pp. 325-331, 9 2019.
Citation
K.Kanagalakshmi, Joycy K.Antony, "Fingerprint Template Protectionsthrough Various Pattern Transformation Approaches: A Review," International Journal of Computer Sciences and Engineering, Vol.7, Issue.10, pp.107-110, 2019.
Review Paper on Minimum DC Bus Voltage for AC-DC Single Stage Full Bridge Converter
Review Paper | Journal Paper
Vol.7 , Issue.10 , pp.111-115, Oct-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i10.111115
Abstract
This paper presents a single-stage circuit topology consisting of the association of a full-bridge isolated dc–dc converter and two input inductors and two input diodes connected to the mains network, in order to obtain an isolated ac/dc switch mode power supply, with sinusoidal input current. The proposed topology does not use an input bridge rectifier, common in similar applications. The current in the two input inductors can therefore, flow in both directions. Consequently, the proposed topology equally distributes the current by the four-bridge transistors that provide four input parallel boost power factor correctors (PFCs). The use of the four bridges permitting the accurate simultaneous regulation of output voltage and input current is hereby described.
Key-Words / Index Term
Full-bridge converters, Input current shaping, low-distortion input current, single-stage power factor correctors (PFCs)
References
[1] K. C. Iseng and T. 1. Liang, "Analysis of integrated boost- flyback step up converter," Processing Inst. Elect. Eng. Elect. Power Appl., vol. 152, no. 2,pp. 217- 225, Mar. 2005.
[2] R. J. Wai and R. Y. Ouan, "High step-up converter with coupled inductor," IEEE Irans. Power Electron. vol. 20, no. 5, pp. 25- 1035, Sep. 2005.
[3] R. J. Wai, C. Y. Lin, C. Y. Lin, R. Y. Ouan, and Y. R. Chang, "High efficiency power conversion system for kilowatt-level stand-alone generation unit with low input voltage," IEEE Irans. Ind. Electron. vol. 55, no. 10, pp. 3702- 3714, Oct. 2008.
[4] L. S. Yang, T. J. Liang, and J. F. Chen, `Transformer-Iess dc- dc converter with high voltage gain, "IEEE Irans. Ind. Electron. vol. 56, no. 8,pp. 3144- 3152, Aug. 2009.
[5] F. L. Luo, "Six self-lift dc- dc converters, voltage lift technique," IEEE Irans. Ind. Electron. vol. 48, no. 6, pp. 1268- 1272, Oec. 2001.
[6] F. L. Luo and H. Ye, "Positive output super-lift converters, "IEEE Irans. Power Electron. vol. 18, no. I , pp. 5- 113, Jan. 2003.
[7] T. F. Wu, Y. S. Lai, 1. C. Hung, and Y. M. Chen, "Boost converter with coupled inductors and buck- boost type of active clamp, "IEEE Irans. Ind. Electron. vol. 55, no. I , pp. 154-162, Jan. 2008.
[8] R. 1. Wai and R. Y. Ouan, "High step-up converter with coupled inductor," IEEE Irans. Power Electron. vol. 20, no. 5, pp. 1025- 1035, Sep. 2005.
[9] T. F. Wu, Y. S. Lai, J. C. Hung, and Y. M. Chen, "Boost converter with coupled inductors and buck- boost type of active clamp," IEEE Irans. Ind. Electron. vol. 55, no. I, pp. 154-162, Jan. 2008.
[10] D. C. Lee and D. S. Lim, “AC voltage and current sensorless control of three-phase PWM rectifiers,” IEEE Trans. Power Electron., vol. 17, no. 6, pp. 883–890, Oct. 2002.
[11] J. Rodr´ıguez et al., “PWM regenerative rectifiers: State of the art,” IEEE Trans. Ind. Electron., vol. 52, no. 1, pp. 5–22, Feb. 2005.
[12] N. Zargari and G. Joos, “Performance investigation of a currentcontrolled voltage-regulated PWM rectifier in rotating and stationary frames,” IEEE Trans. Ind. Electron., vol. 42, no. 4, pp. 396–401, Aug. 1995.
[13] I. Agirman and V. Blasko, “A novel control method of a VSC without AC line voltage sensors,” IEEE Trans. Ind. Appl, vol. 39, no. 2, pp. 519–524, Apr. 2003.
[14] K. Smedley et al., “Unified constant-frequency integration control of active power filters-steady-state and dynamics,” IEEE Trans. Power Electron., vol. 16, no. 3, pp. 428–436, May 2001.
[15] C. Qiao and K. Smedley, “Unified constant-frequency integration control of three-phase standard bridge boost rectifiers with power-factor correction,” IEEE Trans. Ind. Electron., vol. 50, no. 1, pp. 100–107, Feb. 2003.
[16] T. Jin et al., “A universal vector controller for three-phase PFC, APF, STATCOM, and grid-connected inverter,” in Nineteenth Annual, Applied Power Electronics Conference and Exposition(APEC), IEEE, vol. 1. IEEE, 2004, pp. 594–600.
[17] Revathi V I, Muhammedali Shafeeque K" Closed Loop Operation of High Boost OC-OC Converter Operating in CCM Mode" in Proc. International Journal of Scientific Engineering and Applied Science (USEAS) - vol.l , no.4, June 2015.
[18] Revathi V I , Muhammedali Shafeeque K "A Novel High Boost OC-OC Converter for Oistributed Generation System" IEEE ICCCS Conference, 2014
[19] Yi-Ping Hsieh, Jiann-Fuh Chen, Isorng-Juu Liang, and Lung-Sheng Yang," Novel High Step-Up OC- OC Converter with Coupled-Inductor and Switched- Capacitor Iechniques", IEEE Irans. lnd. Electron., vol. 59, no. 2, Feb,2012.
[20] Y.-C. Li, C.-L. Chen, "A novel primary-side regulation scheme for single-stage high-power-factor AC–DC LED driving circuit", IEEE Trans. Ind. Electron., vol. 60, no. 11, pp. 4979-4986, Nov. 2013.
[21] A. A. Fardoun, E. H. Ismail, N. M. Khraim, A. J. Sabzali, M. A. Al-Saffar, "Bridgeless high-power-factor buck-converter operating in discontinuous capacitor voltage mode", IEEE Trans. Ind. Appl., vol. 50, no. 5, pp. 66-72, Sep./Oct. 2014.
[22] S. Chattopadhyay and V. Ramanarayanan, “Digital implementation of a line current shaping algorithm for three phase high power factor boost rectifier without input voltage sensing,” IEEE Trans. Power Electron., vol. 19, no. 3, pp. 709–721, May 2004.
[23] A. G. V. Anand et al., “Unity power factor rectifier using scalar control technique,” in International Conference on Power System Technology, PowerCon 2004, vol. 1. Singapore, IEEE, 2004, pp. 862–867.
[24] S. Ben-Yaakov and I. Zeltser, “The dynamics of a PWM boost converter with resistive input,” IEEE Trans. Ind. Electron, vol. 46, no. 3, pp. 613– 619, Jun. 1999.
[25] D. Ghodke et al., “Modified one-cycle controlled bidirectional highpower-factor AC-to-DC converter,” IEEE Trans. Ind. Electron., vol. 55, no. 6, pp. Jun. 2459–2472, Jun. 2008.
Citation
Rahul Dev Raman, Lokesh Shukla, "Review Paper on Minimum DC Bus Voltage for AC-DC Single Stage Full Bridge Converter," International Journal of Computer Sciences and Engineering, Vol.7, Issue.10, pp.111-115, 2019.