Search results for: carry select adder
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 1974

Search results for: carry select adder

1974 Area Efficient Carry Select Adder Using XOR Gate Design

Authors: Mahendrapal Singh Pachlaniya, Laxmi Kumre

Abstract:

The AOI (AND – OR- INVERTER) based design of XOR gate is proposed in this paper with less number of gates. This new XOR gate required four basic gates and basic gate include only AND, OR, Inverter (AOI). Conventional XOR gate required five basic gates. Ripple Carry Adder (RCA) used in parallel addition but propagation delay time is large. RCA replaced with Carry Select Adder (CSLA) to reduce propagation delay time. CSLA design with dual RCA considering carry = ‘0’ and carry = ‘1’, so it is not an area efficient adder. To make area efficient, modified CSLA is designed with single RCA considering carry = ‘0’ and another RCA considering carry = ‘1’ replaced with Binary to Excess 1 Converter (BEC). Now replacement of conventional XOR gate by new design of XOR gate in modified CSLA reduces much area compared to regular CSLA and modified CSLA.

Keywords: CSLA, BEC, XOR gate, area efficient

Procedia PDF Downloads 334
1973 Design of Speedy, Scanty Adder for Lossy Application Using QCA

Authors: T. Angeline Priyanka, R. Ganesan

Abstract:

Recent trends in microelectronics technology have gradually changed the strategies used in very large scale integration (VLSI) circuits. Complementary Metal Oxide Semiconductor (CMOS) technology has been the industry standard for implementing VLSI device for the past two decades, but due to scale-down issues of ultra-low dimension achievement is not achieved so far. Hence it paved a way for Quantum Cellular Automata (QCA). It is only one of the many alternative technologies proposed as a replacement solution to the fundamental limit problem that CMOS technology will impose in the years to come. In this brief, presented a new adder that possesses high speed of operation occupying less area is proposed. This adder is designed especially for error tolerant application. Hence in the proposed adder, the overall area (cell count) and simulation time are reduced by 88 and 73 percent respectively. Various results of the proposed adder are shown and described.

Keywords: quantum cellular automata, carry look ahead adder, ripple carry adder, lossy application, majority gate, crossover

Procedia PDF Downloads 528
1972 An Embedded High Speed Adder for Arithmetic Computations

Authors: Kala Bharathan, R. Seshasayanan

Abstract:

In this paper, a 1-bit Embedded Logic Full Adder (EFA) circuit in transistor level is proposed, which reduces logic complexity, gives low power and high speed. The design is further extended till 64 bits. To evaluate the performance of EFA, a 16, 32, 64-bit both Linear and Square root Carry Select Adder/Subtractor (CSLAS) Structure is also proposed. Realistic testing of proposed circuits is done on 8 X 8 Modified Booth multiplier and comparison in terms of power and delay is done. The EFA is implemented for different multiplier architectures for performance parameter comparison. Overall delay for CSLAS is reduced to 78% when compared to conventional one. The circuit implementations are done on TSMC 28nm CMOS technology using Cadence Virtuoso tool. The EFA has power savings of up to 14% when compared to the conventional adder. The present implementation was found to offer significant improvement in terms of power and speed in comparison to other full adder circuits.

Keywords: embedded logic, full adder, pdp, xor gate

Procedia PDF Downloads 421
1971 Performance Analysis of Arithmetic Units for IoT Applications

Authors: Nithiya C., Komathi B. J., Praveena N. G., Samuda Prathima

Abstract:

At present, the ultimate aim in digital system designs, especially at the gate level and lower levels of design abstraction, is power optimization. Adders are a nearly universal component of today's integrated circuits. Most of the research was on the design of high-speed adders to execute addition based on various adder structures. This paper discusses the ideal path for selecting an arithmetic unit for IoT applications. Based on the analysis of eight types of 16-bit adders, we found out Carry Look-ahead (CLA) produces low power. Additionally, multiplier and accumulator (MAC) unit is implemented with the Booth multiplier by using the low power adders in the order of preference. The design is synthesized and verified using Synopsys Design Compiler and VCS. Then it is implemented by using Cadence Encounter. The total power consumed by the CLA based booth multiplier is 0.03527mW, the total area occupied is 11260 um², and the speed is 2034 ps.

Keywords: carry look-ahead, carry select adder, CSA, internet of things, ripple carry adder, design rule check, power delay product, multiplier and accumulator

Procedia PDF Downloads 94
1970 Design of Reconfigurable Fixed-Point LMS Adaptive FIR Filter

Authors: S. Padmapriya, V. Lakshmi Prabha

Abstract:

In this paper, an efficient reconfigurable fixed-point Least Mean Square Adaptive FIR filter is proposed. The proposed architecture has two methods of operation: one is area efficient design and the other is optimized power. Pipelining of the adder blocks and partial product generator are used to achieve low area and reversible logic is used to obtain low power design. Depending upon the input samples and filter coefficients, one of the techniques is chosen. Least-Mean-Square adaptation is performed to update the weights. The architecture is coded using Verilog and synthesized in cadence encounter 0.18μm technology. The synthesized results show that the area reduction ratio of the proposed when compared with conventional technique is about 1.2%.

Keywords: adaptive filter, carry select adder, least mean square algorithm, reversible logic

Procedia PDF Downloads 298
1969 Design and Study of a Low Power High Speed Full Adder Using GDI Multiplexer

Authors: Biswarup Mukherjee, Aniruddha Ghosal

Abstract:

In this paper, we propose a new technique for implementing a low power full adder using a set of GDI multiplexers. Full adder circuits are used comprehensively in Application Specific Integrated Circuits (ASICs). Thus it is desirable to have low power operation for the sub components. The explored method of implementation achieves a low power design for the full adder. Simulated results using state-of-art Tanner tool indicates the superior performance of the proposed technique over conventional CMOS full adder. Detailed comparison of simulated results for the conventional and present method of implementation is presented.

Keywords: low power full adder, 2-T GDI MUX, ASIC (application specific integrated circuit), 12-T FA, CMOS (complementary metal oxide semiconductor)

Procedia PDF Downloads 321
1968 Design and Study of a Low Power High Speed 8 Transistor Based Full Adder Using Multiplexer and XOR Gates

Authors: Biswarup Mukherjee, Aniruddha Ghoshal

Abstract:

In this paper, we propose a new technique for implementing a low power high speed full adder using 8 transistors. Full adder circuits are used comprehensively in Application Specific Integrated Circuits (ASICs). Thus it is desirable to have high speed operation for the sub components. The explored method of implementation achieves a high speed low power design for the full adder. Simulated results indicate the superior performance of the proposed technique over conventional 28 transistor CMOS full adder. Detailed comparison of simulated results for the conventional and present method of implementation is presented.

Keywords: high speed low power full adder, 2-T MUX, 3-T XOR, 8-T FA, pass transistor logic, CMOS (complementary metal oxide semiconductor)

Procedia PDF Downloads 319
1967 Optimization of SWL Algorithms Using Alternative Adder Module in FPGA

Authors: Tayab D. Memon, Shahji Farooque, Marvi Deshi, Imtiaz Hussain Kalwar, B. S. Chowdhry

Abstract:

Recently single-bit ternary FIR-like filter (SBTFF) hardware synthesize in FPGA is reported and compared with multi-bit FIR filter on similar spectral characteristics. Results shows that SBTFF dominates upon multi-bit filter overall. In this paper, an optimized adder module for ternary quantized sigma-delta modulated signal is presented. The adder is simulated using ModelSim for functional verification the area-performance of the proposed adder were obtained through synthesis in Xilinx and compared to conventional adder trees. The synthesis results show that the proposed adder tree achieves higher clock rates and lower chip area at higher inputs to the adder block; whereas conventional adder tree achieves better performance and lower chip area at lower number of inputs to the same adder block. These results enhance the usefulness of existing short word length DSP algorithms for fast and efficient mobile communication.

Keywords: short word length (SWL), DSP algorithms, FPGA, SBTFF, VHDL

Procedia PDF Downloads 313
1966 An Adder with Novel PMOS and NMOS for Ultra Low Power Applications in Deep Submicron Technology

Authors: Ch. Ashok Babu, J. V. R. Ravindra, K. Lalkishore

Abstract:

Power has became a burning issue in modern VLSI design. As the technology advances especially below 45nm, technology of leakage power became a big problem apart of the dynamic power. This paper presents a full adder with novel PMOS and NMOS which consume less power compare to conventional full adder, DTMOS full adder. This paper shows different types of adders and their power consumption, area, and delay. All the experiments have been carried out using Cadence® Virtuoso® design lay out editor which shows power consumption of different types of adders.

Keywords: average power, leakage power, delay, DTMOS, PDP

Procedia PDF Downloads 364
1965 A Fault-Tolerant Full Adder in Double Pass CMOS Transistor

Authors: Abdelmonaem Ayachi, Belgacem Hamdi

Abstract:

This paper presents a fault-tolerant implementation for adder schemes using the dual duplication code. To prove the efficiency of the proposed method, the circuit is simulated in double pass transistor CMOS 32nm technology and some transient faults are voluntary injected in the Layout of the circuit. This fully differential implementation requires only 20 transistors which mean that the proposed design involves 28.57% saving in transistor count compared to standard CMOS technology.

Keywords: digital electronics, integrated circuits, full adder, 32nm CMOS tehnology, double pass transistor technology, fault toleance, self-checking

Procedia PDF Downloads 316
1964 Very Large Scale Integration Architecture of Finite Impulse Response Filter Implementation Using Retiming Technique

Authors: S. Jalaja, A. M. Vijaya Prakash

Abstract:

Recursive combination of an algorithm based on Karatsuba multiplication is exploited to design a generalized transpose and parallel Finite Impulse Response (FIR) Filter. Mid-range Karatsuba multiplication and Carry Save adder based on Karatsuba multiplication reduce time complexity for higher order multiplication implemented up to n-bit. As a result, we design modified N-tap Transpose and Parallel Symmetric FIR Filter Structure using Karatsuba algorithm. The mathematical formulation of the FFA Filter is derived. The proposed architecture involves significantly less area delay product (APD) then the existing block implementation. By adopting retiming technique, hardware cost is reduced further. The filter architecture is designed by using 90 nm technology library and is implemented by using cadence EDA Tool. The synthesized result shows better performance for different word length and block size. The design achieves switching activity reduction and low power consumption by applying with and without retiming for different combination of the circuit. The proposed structure achieves more than a half of the power reduction by adopting with and without retiming techniques compared to the earlier design structure. As a proof of the concept for block size 16 and filter length 64 for CKA method, it achieves a 51% as well as 70% less power by applying retiming technique, and for CSA method it achieves a 57% as well as 77% less power by applying retiming technique compared to the previously proposed design.

Keywords: carry save adder Karatsuba multiplication, mid range Karatsuba multiplication, modified FFA and transposed filter, retiming

Procedia PDF Downloads 204
1963 A New Full Adder Cell for High Performance Low Power Applications

Authors: Mahdiar Hosseighadiry, Farnaz Fotovatikhah, Razali Ismail, Mohsen Khaledian, Mehdi Saeidemanesh

Abstract:

In this paper, a new low-power high-performance full adder is presented based on a new design method. The proposed method relies on pass gate design and provides full-swing circuits with minimum number of transistors. The method has been applied on SUM, COUT and XOR-XNOR modules resulting on rail-to-rail intermediate and output signals with no feedback transistors. The presented full adder cell has been simulated in 45 and 32 nm CMOS technologies using HSPICE considering parasitic capacitance and compared to several well-known designs from literature. In addition, the proposed cell has been extensively evaluated with different output loads, supply voltages, temperatures, threshold voltages, and operating frequencies. Results show that it functions properly under all mentioned conditions and exhibits less PDP compared to other design styles.

Keywords: full adders, low-power, high-performance, VLSI design

Procedia PDF Downloads 355
1962 Select-Low and Select-High Methods for the Wheeled Robot Dynamic States Control

Authors: Bogusław Schreyer

Abstract:

The paper enquires on the two methods of the wheeled robot braking torque control. Those two methods are applied when the adhesion coefficient under left side wheels is different from the adhesion coefficient under the right side wheels. In case of the select-low (SL) method the braking torque on both wheels is controlled by the signals originating from the wheels on the side of the lower adhesion. In the select-high (SH) method the torque is controlled by the signals originating from the wheels on the side of the higher adhesion. The SL method is securing stable and secure robot behaviors during the braking process. However, the efficiency of this method is relatively low. The SH method is more efficient in terms of time and braking distance but in some situations may cause wheels blocking. It is important to monitor the velocity of all wheels and then take a decision about the braking torque distribution accordingly. In case of the SH method the braking torque slope may require significant decrease in order to avoid wheel blocking.

Keywords: select-high, select-low, torque distribution, wheeled robots

Procedia PDF Downloads 95
1961 Security System for Safe Transmission of Medical Image

Authors: Mohammed Jamal Al-Mansor, Kok Beng Gan

Abstract:

This paper develops an optimized embedding of payload in medical image by using genetic optimization. The goal is to preserve region of interest from being distorted because of the watermark. By using this developed system there is no need of manual defining of region of interest through experts as the system will apply the genetic optimization to select the parts of image that can carry the watermark with guaranteeing less distortion. The experimental results assure that genetic based optimization is useful for performing steganography with less mean square error percentage.

Keywords: AES, DWT, genetic algorithm, watermarking

Procedia PDF Downloads 382
1960 A Development Model of Factors Affecting Decision Making to Select Successor in Family Business of Thailand

Authors: Polvasut Mahaiamsiri, Piraphong Foosiri

Abstract:

The purpose of this research is to explore the model of factors affecting decision making to select successor in family business of Thailand. A Structural Equation Model (SEM) was created from relevant theories and researches. Consequently, examine and analyse, the causal relation factors of Succession Plan, Recruitment Process and Strategic Planning, whether they have direct or indirect effects on Decision Making to Select Successor in family business. Units of analysis are selected from the family business, totalling 300 sampling. Population sampling is current owners or CEO from the percentage of six district areas in Thailand with multi-stage sampling. A set of questionnaires is used to collect data. An analysis of structural equation modelling (SEM) technique using AMOS 21 program is conducted to test the hypotheses and confirmatory factor analysis is performed and shows that these variables can be tested. The finding of this study revealed that these factors are separate constructs that combine to determine decision making to select successors.

Keywords: succession plan, family business, recruitment process, strategic planning, decision making to select successor

Procedia PDF Downloads 166
1959 Methodology for the Selection of Chemical Textile Products

Authors: Oscar F. Toro, Alexia Pardo Figueroa, Brigitte M. Larico

Abstract:

The development of new processes in the textile industry entails designing methodologies to select adequate supplies that fit these new processes requirements. This paper presents a methodology to select chemicals that fulfill a new process technical specifications. The proposed methodology involves three major phases: (1) Data collection of chemical products, (2) Qualitative pre-selection and (3) Laboratory tests. We have applied this methodology to the selection of a binder which will form a protective film above the textile fibers and bond them. Our findings were that, there exist five possible products that can be used in our new process: Arkofil, Elvanol, Size plus A, Size plus AC and Starch. This new methodology has both qualitative and experimental variables, and can be used to select supplies for new textile processes.

Keywords: binder, chemical products, selection methodology, textile supplies, textile fiber

Procedia PDF Downloads 264
1958 Deradicalization for Former Terrorists through Entrepreneurship Program

Authors: Jamal Wiwoho, Pujiyono, Triyanto

Abstract:

Terrorism is a real enemy for all countries, including Indonesia. Bomb attacks in some parts of Indonesia are proof that Indonesia has serious problems with terrorism. Perpetrators of terror are arrested and imprisoned, and some of them were executed. However, this method did not succeed in stopping the terrorist attacks. Former terrorists continue to carry out bomb attacks. Therefore, this paper proposes a program towards deradicalization efforts of former terrorists through entrepreneurship. This is necessary because it is impossible to change their radical ideology. The program is also motivated by understanding that terrorists generally come from poor families. This program aims to occupy their time with business activities so there is no time to plan and carry out bomb attacks. This research is an empirical law study. Data were collected by literature study, observation, and in-depth interviews. Data were analyzed with the Miles and Huberman interactive model. The results show that the entrepreneurship program is effective to prevent terrorist attack. Former terrorists are busy with their business. Therefore, they have no time to carry out bomb attacks.

Keywords: deradicalization, terrorism, terrorists, entrepreneurship

Procedia PDF Downloads 239
1957 Navigating the Legal Seas: The Freedom to Choose Applicable Law in Tort

Authors: Sara Vora (Hoxha)

Abstract:

An essential feature of any international lawsuit is the ability of the parties to pick the law that would apply in the event of a tort claim. This option to choose the law to use in tort cases is based on Article 14 and 4/3 of the Rome II Regulation. The purpose of this article is to examine the boundaries of this freedom, as well as its relevance in international legal disputes. The article opens with a brief introduction to the basics of tort law. After a short introduction, the article demonstrates why Article 14 and 4/3 of the Rome II Regulation are so crucial to the right to select appropriate law in tort cases. The notion of the right to select the law to use in tort cases is examined, along with its breadth and possible restrictions. The article presents case studies to demonstrate how the right to select relevant law in tort might be put into practise. Case results and the judges' rationales for their rulings are examined. The possible influence of the right to select applicable law in tort on the process of harmonisation is also explored in this study. The results are summarised and the primary research question is addressed in the last section of the paper. In conclusion, the parties' ability to pick the law that rules their dispute via the freedom to choose relevant law in tort is a crucial feature of cross-border litigation. Despite certain restrictions, this freedom is nevertheless an important part of the legal structure that governs international conflicts.

Keywords: applicable law, tort, Rome II regulation, freedom to choose, cross-border litigation, harmonization of tort law

Procedia PDF Downloads 37
1956 The Hidden Role of Interest Rate Risks in Carry Trades

Authors: Jingwen Shi, Qi Wu

Abstract:

We study the role played interest rate risk in carry trade return in order to understand the forward premium puzzle. In this study, our goal is to investigate to what extent carry trade return is indeed due to compensation for risk taking and, more important, to reveal the nature of these risks. Using option data not only on exchange rates but also on interest rate swaps (swaptions), our first finding is that, besides the consensus currency risks, interest rate risks also contribute a non-negligible portion to the carry trade return. What strikes us is our second finding. We find that large downside risks of future exchange rate movements are, in fact, priced significantly in option market on interest rates. The role played by interest rate risk differs structurally from the currency risk. There is a unique premium associated with interest rate risk, though seemingly small in size, which compensates the tail risks, the left tail to be precise. On the technical front, our study relies on accurately retrieving implied distributions from currency options and interest rate swaptions simultaneously, especially the tail components of the two. For this purpose, our major modeling work is to build a new international asset pricing model where we use an orthogonal setup for pricing kernels and specify non-Gaussian dynamics in order to capture three sets of option skew accurately and consistently across currency options and interest rate swaptions, domestic and foreign, within one model. Our results open a door for studying forward premium anomaly through implied information from interest rate derivative market.

Keywords: carry trade, forward premium anomaly, FX option, interest rate swaption, implied volatility skew, uncovered interest rate parity

Procedia PDF Downloads 417
1955 Al-Azhar’s Ideological Capacity to Counter Extremism

Authors: Dina Tawfic, Robert Hassan

Abstract:

The current chapter addresses Al-Azhar's strategy to counter extremism in tandem with reflecting on the ideology of the Islamic establishment itself. The topic is motivated by the fact that some of the Western governments have been relying on Al-Azhar to counter the ideology of Islamist radicalism and violent extremism, in particular during the rise of the Islamic State in Syria and Iraq (known as ISIS/ ISIL/ Daesh) in 2014/2015. In his visit to Egypt in June 2016, Brett McGurk, the then U.S. envoy for the global coalition to counter ISIS, commended Al-Azhar’s “intellectual and reforming role” in refuting the ideology of extremism. On the other hand, Egyptian liberal intellectuals, such as Farag Fouda (1945- 1992) and Nasr Hamed Abu Zeid (1943-2010), had always questioned the ideological capability of Al-Azhar to counter extremism, citing the rigidity and resistance of the Islamic establishment to carry out genuine reformation. This chapter aims to discuss the following research questions: what is the strategy of Al-Azhar to counter extremism? Does Al-Azhar have a solid strategy to combat online propaganda produced by violent extremist groups? Is it applicable to identify Al-Azhar ideological identity? and is it capable of countering extremism? To answer these questions, I conducted intensive interviews with seven senior scholars and officials at Al-Azhar and the Endowments ministry from September to December 2020. Using a qualitative approach as a backdrop, this project uses semi-structured interviews to collect data. Participants were briefed on the purpose of the study and consented to be interviewed and to record their interviews. Some of the participants chose to conceal their names. All the interviews were conducted in Arabic via Zoom. The researcher then transcribed and translated the interviews into English. A purposive sample is used to select the seven interviewees, based on their prominence and experience in the field of counter-extremism and Al-Azhar affairs. The researcher uses a snowball sample to select the sample, in which a personal contact recommends other officials within the establishment.

Keywords: Al-Azhar, Egypt, Counter-Extremism, Political Islam, Ideology

Procedia PDF Downloads 193
1954 The Analysis on the Renewal Strategy of Public Space in Old Communities with an Example of GeDa Community in Xi'An

Authors: Xiyue Wen

Abstract:

With the rapid development of the city, old communities in the city are facing a series of problems. On one hand, aging facilities, obsolete spatial patterns, aging populations arouse in the aging of the community. On the other hand, public space is reduced and is taking up by cars parking or facilities setting, which lead to the collapse of traditional life in the old communities. That is to say, modern amenities haven’t helped to reform the old community, but have leading to tedious and inefficient, when it is not accommodated in the traditional space. Exploring a way is imminent to the east the contradiction between modern living facilities and spatial patterns of traditional. We select a typical site-GeDa Community in Xi’an, built in 70-80s,and carry out a concept calling 'Raising Landscape', which enables a convenient and efficient space for parking, as well as a high-quality yard for activities. In addition, the design implements low cost, simple construction, resident participation, so that it can be spread in the same texture of urban space.

Keywords: old communities, renewal strategy, raising landscape, public space, parking space

Procedia PDF Downloads 451
1953 Generation of 3d Models Obtained with Low-Cost RGB and Thermal Sensors Mounted on Drones

Authors: Julio Manuel De Luis Ruiz, Javier Sedano Cibrián, RubéN Pérez Álvarez, Raúl Pereda García, Felipe Piña García

Abstract:

Nowadays it is common to resort to aerial photography to carry out the prospection and/or exploration of archaeological sites. In this sense, the classic 3D models are being applied to investigate the direction towards which the generally subterranean structures of an archaeological site may continue and therefore, to help in making the decisions that define the location of new excavations. In recent years, Unmanned Aerial Vehicles (UAVs) have been applied as the vehicles that carry the sensor. This implies certain advantages, such as the possibility of including low-cost sensors, given that these vehicles can carry the sensor at relatively low altitudes. Due to this, low-cost dual sensors have recently begun to be used. This new equipment can collaborate with classic Digital Elevation Models (DEMs) in the exploration of archaeological sites, but this entails the need for a methodological setting to optimise the acquisition, processing and exploitation of the information provided by low-cost dual sensors. This research focuses on the design of an appropriate workflow to obtain 3D models with low-cost sensors carried on UAVs, both in the RGB and thermal domains. All the foregoing has been applied to the archaeological site of Juliobriga, located in Cantabria (Spain).

Keywords: process optimization, RGB models, thermal models, , UAV, workflow

Procedia PDF Downloads 107
1952 Bioefficacy of Diclosulam for Controlling Weeds in Soybean [Glycine Max (L.) Merrill] and Its Carry Over Effect on Succeeding Wheat (Triticum Aestivum) Crop

Authors: Pratap Sing, Chaman. K. Jadon, H. P. Meena, D. L.yadav, S. L. Yadav, Uditi Dhakad

Abstract:

The experiment was conducted at Agricultural Research Station, Agriculture University, Kota, Rajasthan, India during kharif and rabi 2020-21 and 2021-22 to study the biofficacy of diclosulam and its residual effect on succeeding wheat crop. The treatments comprised of Diclosulam 84 % WDG viz. 6.25, 12.50, 25.00 and 37.50 g/ha as pre emergence (PE), Pendimethalin 30% EC 3.33 l/ha, Sulfentrazon 48% SC 750 g/ha, hand weeding at 30 and 45 DAS and weedy check, were evaluated in randomized block design in three replications. The experimental soil was clay in texture and non-calcareous. Experimental field was mainly dominated by grasses-Echinochloa colonum, E.crusgalli,Cynodon dactylon, Sedges-Cyperus rotundus and broad leaved weeds Celosia argentea and Digera arvensis.The result revealed that application of Diclosulam 84 % WDG 25 g/ha PE was found effective in controlling mostly weed species and registered higher weed control efficiency 81.2, 74.3, 69.6 per cent at 30, 45 days after sowing and at harvest. Diclosulam 84 % WDG (6.25-25.0 g/ha) was found selective to the soybean crop as no any phytotoxicity symptoms were observed. Among the herbicidal treatments, Diclosulam 84 % WDG 25 g/ha registered maximum and significantly higher soybean seed yield (1889 and 1431 kg/ha during kharif 2020 and 2021, respectively and was at par with Sulfentrazone 48% SC 750 g/ha and over weedy check( 1027 and 667 kg/ha).The wheat crop growth, yield attributes and seed yield were not influenced due to carry over effect of the Diclosulam 84 % WDG( 6.25-25.0 g/ha) and no any phytotoxicity symptoms were observed. Henceforth, the Diclosulam 84 % WDG 25.0 g/ha as pre emergence may be used in the soybean for effective weed control without carry over effect on succeeding wheat crop.

Keywords: Diclosulam, soybean, carry over effect, succeeding wheat

Procedia PDF Downloads 76
1951 Study on the Efficient Routing Algorithms in Delay-Tolerant Networks

Authors: Si-Gwan Kim

Abstract:

In Delay Tolerant Networks (DTN), there may not exist an end-to-end path between source and destination at the time of message transmission. Employing ‘Store Carry and Forward’ delivery mechanism for message transmission in such networks usually incurs long message delays. In this paper, we present the modified Binary Spray and Wait (BSW) routing protocol that enhances the performance of the original one. Our proposed algorithm adjusts the number of forward messages depending on the number of neighbor nodes. By using beacon messages periodically, the number of neighbor nodes can be managed. The simulation using ONE simulator results shows that our modified version gives higher delivery ratio and less latency as compared to BSW.

Keywords: delay tolerant networks, store carry and forward, one simulator, binary spray and wait

Procedia PDF Downloads 98
1950 Development of Fixture for Pipe to Pipe Friction Stir Welding of Dissimilar Materials

Authors: Aashutosh A. Tadse, Kush Mehta, Hardik Vyas

Abstract:

Friction Stir Welding is a process in which an FSW tool produces friction heat and thus penetrates through the junction and upon rotation carries out the weld by exchange of material within the 2 metals being welded. It involves holding the workpieces stiff enough to bear the force of the tool moving across the junction to carry out a successful weld. The weld that has flat plates as workpieces, has a quite simpler geometry in terms of fixture holding them. In the case of FSW of pipes, the pipes need to be held firm with the chucks and jaws according to the diameter of the pipes being welded; the FSW tool is then revolved around the pipes to carry out the weld. Machine requires a larger area and it becomes more costly because of such a setup. To carry out the weld on the Milling machine, the newly designed fixture must be set-up on the table of milling machine and must facilitate rotation of pipes by the motor being shafted to one end of the fixture, and the other end automatically rotated because of the rotating jaws held tight enough with the pipes. The set-up has tapered cones as the jaws that would go in the pipes thus holding it with the help of its knurled surface providing the required grip. The process has rotation of pipes with the stationary rotating tool penetrating into the junction. The FSW on pipes in this process requires a very low RPM of pipes to carry out a fine weld and the speed shall change with every combination of material and diameter of pipes, so a variable speed setting motor shall serve the purpose. To withstand the force of the tool, an attachment to the shaft is provided which will be diameter specific that will resist flow of material towards the center during the weld. The welded joint thus carried out will be proper to required standards and specifications. Current industrial requirements state the need of space efficient, cost-friendly and more generalized form of fixtures and set-ups of machines to be put up. The proposed design considers every mentioned factor and thus proves to be positive in the same.

Keywords: force of tool, friction stir welding, milling machine, rotation of pipes, tapered cones

Procedia PDF Downloads 91
1949 Mimesis in William Shakespeare's Selected Sonnets

Authors: Roselyn T. Bustos

Abstract:

Literature is an imitation of life. It depicts man's culture as well as his struggles. In short, literature is a part of man's way of life- a reflection of his personal or vicarious experiences. Using the qualitative-descriptive content analysis, this study investigates the mimetic signification in the five select sonnets of William Shakespeare.An in- depth analysis of the poetic elements such as the figurative language used and the themes extracted is made to draw out the universal meaning of his works. It is found out that his select sonnets use figurative languages such as simile, metaphor, personification, and hyperbaton which becomes a potent element that allows his sonnets to convey the themes of love and perseverance. With these findings, it is concluded that William Shakespeare's sonnets are evidently written within the context of the universals and that they are worthy of wide readership not only because of him being a renowned English poet and playwright but most importantly of the realities his sonnets signify.

Keywords: imitation, mimesis, potent, realities

Procedia PDF Downloads 419
1948 Form and Content in Adonis Durado’s Poesy: Integrated Teaching Guide

Authors: Angen May T. Fabro

Abstract:

This study analyzed how the form and content in Adonis Durado’s select poems revealed universal realities for a proposed integrated teaching guide. The study employed discourse analysis that generates verbal interpretation of data to answer the variables under study in order to satisfy the main problem. This method used analyses and interpretations of discourse texts of the literary work under study. This research made use of studies and research investigations relevant to the present investigation. Findings of the study showed that form and content play a significant role in identifying the universal realities found in the select poems of Adonis Durado.

Keywords: poems, poesy, integrated teaching guide, Adonis Durado’s poesy

Procedia PDF Downloads 278
1947 Evaluating Service Trustworthiness for Service Selection in Cloud Environment

Authors: Maryam Amiri, Leyli Mohammad-Khanli

Abstract:

Cloud computing is becoming increasingly popular and more business applications are moving to cloud. In this regard, services that provide similar functional properties are increasing. So, the ability to select a service with the best non-functional properties, corresponding to the user preference, is necessary for the user. This paper presents an Evaluation Framework of Service Trustworthiness (EFST) that evaluates the trustworthiness of equivalent services without need to additional invocations of them. EFST extracts user preference automatically. Then, it assesses trustworthiness of services in two dimensions of qualitative and quantitative metrics based on the experiences of past usage of services. Finally, EFST determines the overall trustworthiness of services using Fuzzy Inference System (FIS). The results of experiments and simulations show that EFST is able to predict the missing values of Quality of Service (QoS) better than other competing approaches. Also, it propels users to select the most appropriate services.

Keywords: user preference, cloud service, trustworthiness, QoS metrics, prediction

Procedia PDF Downloads 254
1946 Non-Family Members as Successors of Choice in South African Family Businesses

Authors: Jonathan Marks, Lauren Katz

Abstract:

Family firms are a vital component of a country’s stability, prosperity and development. Their sustainability, longevity and continuity are critical. Given the premise that family firms wish to continue the business for the benefit of the family, the family founder / owner is faced with an emotionally charged transition option; either to transfer the family business to a family member or to transfer the firm to a non-family member. The rationale employed by family founders to select non-family members as successors/ executives of choice and the concomitant rationale employed by non-family members to select family firms as employers of choice, has been under-researched in the literature of family business succession planning. This qualitative study used semi-structured interviews to gain access to family firm founders/ owners, non-family successors/ executives and industry experts on family business. The findings indicated that the rationale for family members to select non-family successors/ executives was underpinned by the objective to grow the family firm for the benefit of the family. If non-family members were the most suitable candidates to ensure this outcome, family members were comfortable to employ non-family members. Non- family members, despite the knowledge that benefit lay primarily with family members, chose to work for family firms for personal benefits in terms of wealth, security and close connections. A commonly shared value system was a pre-requisite for all respondents. The research study provides insights from family founders/ owners, non-family successors/ executives, and industry experts on the subject of succession planning outside the family structure.

Keywords: agency theory, family business, institutional logics, non-family successors, Stewardship Theory

Procedia PDF Downloads 336
1945 An Efficient Digital Baseband ASIC for Wireless Biomedical Signals Monitoring

Authors: Kah-Hyong Chang, Xin Liu, Jia Hao Cheong, Saisundar Sankaranarayanan, Dexing Pang, Hongzhao Zheng

Abstract:

A digital baseband Application-Specific Integrated Circuit (ASIC) is developed for a microchip transponder to transmit signals and temperature levels from biomedical monitoring devices. The transmission protocol is adapted from the ISO/IEC 11784/85 standard. The module has a decimation filter that employs only a single adder-subtractor in its datapath. The filtered output is coded with cyclic redundancy check and transmitted through backscattering Load Shift Keying (LSK) modulation to a reader. Fabricated using the 0.18-μm CMOS technology, the module occupies 0.116 mm² in chip area (digital baseband: 0.060 mm², decimation filter: 0.056 mm²), and consumes a total of less than 0.9 μW of power (digital baseband: 0.75 μW, decimation filter: 0.14 μW).

Keywords: biomedical sensor, decimation filter, radio frequency integrated circuit (RFIC) baseband, temperature sensor

Procedia PDF Downloads 363