i Preface Welcome to the Volume 5 Number 1 of the International Journal of Design, Analysis and Tools for Integrated Circuits and Systems (IJDATICS). This issue comprises of i) enhanced and extended version of research papers from the International DATICS Workshops in 2014, and ii) ordinary manuscript submissions in 2014. DATICS Workshops were created by a network of researchers and engineers both from academia and industry in the areas of i) Design, Analysis and Tools for Integrated Circuits and Systems and ii) Communication, Computer Science, Software Engineering and Information Technology. The main target of DATICS Workshops is to bring together software/hardware engineering researchers, computer scientists, practitioners and people from industry to exchange theories, ideas, techniques and experiences. This IJDATICS issue presents three high quality academic papers. This mix provides a well-rounded snapshot of current research in the field and provides a springboard for driving future work and discussion. The three papers presented in this volume are summarized as follows: • Circuit Design: Gopalan proposes a design procedure for realizing a linear CMOS source-coupled differential pair (SCDP) transconductance element. • Software Management: Arnuphaptrairong investigates the state of the practice of software risk management including problems and barriers facing the Thai software industry. • Cloud Computing: Hahanov, Gharibi, Litvinova, Chumachenko, Guz, and Man present a cloud service for an intelligent road infrastructure to monitor and control traffic in real-time. We are beholden to all of the authors for their contributions to the Volume 5 Number 1 of IJDATICS. We would also like to thank the IJDATICS editorial team. Editors: Ka Lok Man, Xi’an Jiaotong-Liverpool University, China, and Baltic Institute of Advanced Technology (BPTI), Lithuania Chi-Un Lei, University of Hong Kong, Hong Kong Amir-Mohammad Rahmani, University of Turku, Finland David Afolabi, Xi’an Jiaotong-Liverpool University, China ii Table of Contents Vol. 5, No. 1, December 2014 Preface ………………………………………………………………………………....... i Table of Contents ……………………………………………………………………….. ii 1. Design of Linear CMOS Transconductance Elements for Alpha-Power Law Based 1 MOSFETs ........................................................................................… Bhaskar Gopalan 2. Software Risk Management Practice: Evidence from Thai Software Industry ………… 10 ……………………………………………………………. Tharwon Arnuphaptrairong 3. Intellectual Green Wave Cloud for Traffic Control: Challenges and Proposed Solutions ……………....…………………………………………… Vladimir Hahanov, 19 Wajeb Gharibi, Eugenia Litvinova, Svetlana Chumachenko, Olesya Guz, Ka Lok Man INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 1 Design of Linear CMOS Transconductance Elements for Alpha-Power Law Based MOSFETs Bhaskar Gopalan Abstract—A model on alpha-power law MOSFETs based superior to that of the conventional source-coupled differential source-coupled differential pair (SCDP) is discussed and a simple pair. The computer simulation results are presented. design procedure for realizing a linear CMOS SCDP All MOSFET’s are assumed to be enhancement-mode types transconductance element is proposed. The modified SCDP biased in saturation and the transistor behavior is approximated circuit using this procedure is an alternative to that of by the relation, conventional SCDP and the circuit discussed has superior kp 1+λV α linearity than the conventional SCDP for a wide range of input I= Vgs -vth (1) ds differential voltage. The modified SCDP also includes the 2 circuitry needed to suppress the variation in the quiescent current where vth is the total threshold voltage inclusive of body-effect. kp=KP W/L is the transconductance parameter, W and L with respect to input common-mode voltage noise. The SPICE results are used to verify theoretical predictions. The results show close agreement between the predicted model behavior and the are the width and length of the channel, is due to the effect simulated performance. The simulated result on Total Harmonic Distortion (THD) shows that the modified SCDP circuit is better of channel length modulation and α is the alpha-power law than the conventional SCDP for a wide dynamic range. An value. example circuit, a second order continuous time gm-C band-pass A theory on modeling a transconductance parameter for a filter is constructed using fully differential modified SCDP and SCDP transconductor based on alpha-power law MOSFETs is fully differential conventional SCDP circuit and the result shows described in section-II. A condition to achieve the linearity in that the modified transconductor circuit is better in linearity than the transconductance parameter is discussed in section-III. the conventional SCDP. Section-IV proposes a simple design procedure used to cancel out the third degree term in the transconductance and to make a Index Terms—CMOS Transconductor, SCDP circuit, Linearity, Total harmonic distortion (THD), gm-C filter, SPICE Models. perfect linear transconductor. The section-IV also includes the circuitry that is needed to minimize the variation of biasing I. INTRODUCTION current with respect to input common-mode voltage. The section-V presents the results, one with alpha-power law L INEAR transconductance elements [1]-[14] are useful in building blocks in analog signal-processing systems and the literature on this topic is rich indeed. A devices and the other with square law devices for both SCDP and the modified SCDP. The section-VI describes on how the cross-coupled quad cell is proposed by [1]. An inverter-based various output conductances (channel length modulation) are transconductor is discussed in [10] and [13]. In [9], a bias-offset included in the present model for a fully differential cross-coupled transconductor is realized. In [1] and [8], the transconductor. A gm-C band-pass filter based out of the linearity with input differential voltage is achieved by CMOS conventional SCDP and the modified SCDP is described in pairs and floating voltage sources. In [6], the linearity is section-VII. Section-VIII concludes about the modified SCDP achieved with two additional PMOS SCDP pairs. The source circuitry based on alpha-power law MOSFETs. degeneration linearization is used in [11]. A four MOS transistor cell to obtain a linear transconductor is realized in II. THEORY ON BASIC CMOS SCDP TRANSCONDUCTOR [12]. In [14], the linearity is obtained with a quadritail cell. In BASED ON ALPHA-POWER LAW MOSFETS all of these transconductors discussed, only the square law Let I1 and I 2 be the drain currents in the two branches of devices are considered but in the present paper, a model for SCDP based on the alpha-power law devices is proposed. the SCDP circuit (Fig.1) and Vgs1 and Vgs2 be the gate-source The objective of this paper is to present a model for voltages of the respective NMOS MOSFETs in the SCDP. vth alpha-power law based CMOS SCDP transconductors and a is the total effective threshold voltage of NMOS MOSFETs simple design procedure for the realization of linear CMOS including body-effect. The body-effect’s dependence on input modified SCDP transconductance block for both single-ended differential voltage is considered in section-III. Neglecting and fully differential outputs. The modified SCDP doesn’t channel length modulation for time being (it is accounted later require any special cell and includes the same circuit as in the section-VI), we have from (1), required in a conventional SCDP as the base circuitry. Also the 1/α 1/α linearity and the input voltage range of the proposed design are 2I 2I Vgs1 = 1 +vth ; Vgs2 = 2 +vth (2) kp kp Manuscript received December, 24, 2013. Vin =Vgs1 -Vgs2 ; (3) Bhaskar Gopalan is an independent consultant in Chennai, India. Phone: +91-44-22240746; email: bhaskar_gopalan@hotmail.com. From (2) and (3), we have, INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 2 Vin2 = 2 2/α I12/α +I22/α -2 I1I2 1/α Iss 2 I02 +2mq I0 Vin2 kp 2 K α I02 1+ αVin2 /8 2 (4) Vcm -VP -vth kp Noting that I1 -I2 = I1 +I2 -4I1I2 =Iss 2 -4I1I2 , 2 2 (5) (17) where Iss is the quiescent current for SCDP. From which we obtain, From (4) and (5), we have αI0 /16 mq = (18) I0 /kp 2/α 2 2/α 2/α 2 2 2 1/α 2/α Vin2 = I1 +I2 - 1/α Iss - I1 -I2 (6) kp 4 where This could be written using (2) as, I0 =kp(Vcm -VP -vth)α . (19) 2 2 V +V 2 1/α Iss - I1 -I 2 Now writing equation (12) by binomial series, we have, 2 2 gs1 -vth gs2 -vth -Vin2 = 2/α kp αV 2 α α-1 Vin4 higher order VX=(2K)α 1- in + - (20) (7) 2K 8K 2 terms Expanding (7) we arrive, provided kp 2 2 Vin 2K (21) ID =I1 -I2 = Iss - α VX (8) 2 where K α = Iss/kp 2 where VX is given by (22) α VX= Vgs1 2 2 +Vgs2 -2vth Vgs1 +Vgs2 +2vth 2 -Vin2 (9) Substituting equations (20) and (22) in equation (8), we arrive after neglecting higher order terms as, Let Vcm be the input common-mode voltage. VP is the node ID =G m Vin 1- α-1 V 2 (23) voltage at the point P in Fig.1. Let Vgs1 and Vgs2 be written as, in 4K Vin where Vgs1 =Vcm + -VP ; 2 (10) α Gm = Iss (24) V 2K Vgs2 =Vcm - in -VP 2 Equations (23) and (24) constitute the required equations for Vgs1 +Vgs2 =2 Vcm -VP (11) the output differential current which are similar to the one in square law based SCDP circuit. From (9), (10) and (11), VX can be written as, α III. THE CONDITION FOR COMPENSATED SCDP V2 VX= 2K 1- in α (12) Let Iss be written as, 2K Iss=I0 +mVin2 + higher order terms (25) where K is given by with new ‘ m ’ in equation (15) required to cancel out the cubic Vin2 K= Vcm -VP -vth + 2 (13) degree dependency of I D on Vin . 4 Considering only the second degree dependency on Vin , we The differential current I D for a source-coupled pair can be have Iss as, written as, Iss=I0 +mVin2 (26) ID =a 0 Vin +a1Vin3 +(higher order terms) (14) Equation (26) accounts for all second degree input and let biasing current Iss be written as, differential voltage effects including VP and vth dependence Iss=I0 +mq Vin2 +(higher order terms) (15) on Vin2 . Now consider in equations (8), (12) and (13), we have, Substituting (25) in (23), we get α kp 2 2K α Vin2 /4 α 1/α I +mV 2-2/α =kp 2 Vcm -VP -vth 2α 2 1+ 2 ID = kp Vin 2 Vcm -VP -vth 0 in 2α 2 (27) α-1 kp2/α Vin2 1/2 2 2-4/α (16) Expanding the curly bracket term by binomial series and - I0 +mVin neglecting higher order terms and noting that the above 4 2 which upon expanding by binomial series and grouping like equation should be equal to Iss since the dc term of equation terms can be written as (also by neglecting higher order terms), (14) is zero, we have equation (16) that could be written from equations (8), (12), (13) and (15) as, INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 3 m 2-2/α ID α 1/α kp Vin I02-2/α +Vin2 I02-2/α 2 I0 1/2 (28) - I02-4/α α-1 kp2/α 4 provided I0 Vin (29) m The equation (28) shows that the term in the square bracket should be zero to achieve a linear transconductance. This result can be stated as, αI0 /8 m= (30) I0 /kp 2/α For square law based SCDP circuit, m=kp/4 (31) Fig. 2. The Modified Source-coupled pair – (Single ended output). Equation (31) is the result obtained by [1] for a square law V1=Vcm+Vin/2 and V2=Vcm-Vin/2; Vin=V1-V2. based SCDP circuit. Equation (30) is the required condition to eliminate third degree term in the transconductance value in equation (23). Also to be noted is the following relation between the condition ‘m’ required to cancel out the cubic degree dependency of I D on Vin and the coefficient ‘ m q ’ in Iss for a basic SCDP. m=2mq (32) Equation (32) implies that twice the variation of Iss with respect to Vin2 than conventional SCDP is required for I D to cancel out the cubic degree dependency. Fig. 3. The current source block as in Fig.2. Fig. 1. The Conventional Source-coupled pair –(Single ended output). V1=Vcm+Vin/2 and V2=Vcm-Vin/2 ; Vin=V1-V2. Fig. 4. A Fully differential Transconductor using two single ended output cells. Vin=V1-V2. In Fig.1, VP can be written as, VP =VP0 +δVin2 (33) INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 4 The threshold voltage vth is given approximately by, m new value accounts for these higher order terms in vth=vth0+K1 Φs +VP - Φs +K 2 VP (34) addition. The zero differential voltage based current I0M is the where K1 and K 2 are due to non-uniform substrate doping and same as I 0 . Now the modified ‘ m ’ can be rewritten from Φs is the surface potential. equation (30) using equation (42) as, α m new = kp2/α I'0 α 1-2/α 1-2/α Using equation (33), vth can be written as, = kp2/α I0M -mqm Vin2 8 8 δV 2 1 (47) vth=vth0+K1 ΦsS 1+ in - +K 2 VP0 +K 2 δVin2 Φs S S Upon expansion of m new value by binomial series and (35) neglecting higher order terms, we get the following equation. 1-2/α mqm 2 2/α where S is given by, αI0M kp V m new 1- Vin (48) S=1+ P0 (36) 8 I0M I 0M Φs Now Iss can be written from using equations (46) and (48) Expanding the bracket term in the above equation (35) by as, α 1-2/α mqm Vin4 binomial series, we obtain after neglecting higher order terms as, αI0M Vin2 Iss=I0M + - (49) 8 I0M /kp 8 I0M /kp 2/α 2/α vth vth0+K1 Φs S-1 +K 2 VP0 +δK P Vin2 (37) ΦsS The inclusion of VP and vth varying with Vin2 has already provided Vin (38) been accounted in the second term of above equation (49) and δ its effect makes explicit presence in the third term of equation where K P is given by, (49). The modified ‘ m ’ after neglecting higher order terms is, K1 2/α K P =K 2 + (39) αI kp 2 ΦsS m(new)= 0M (50) 8 I0M From (19), (33) and (37), we have the modified I 0 as, which is the same as equation (30). α δ 1+K P Vin2 The next section discusses on how to achieve the condition α α I'0 =kp Vcm -vth-VP0 -δVin2 =kpVPM 1- (50) to make a perfect linear transconductor. VPM (40) IV. DESIGN OF MODIFIED SCDP WITH COMPENSATION FOR LINEARITY Where VPM = Vcm -vth0-K1 S-1 Φs -VP0 1+K 2 (41) The modified SCDP circuit with compensation for linearity Writing (40) by binomial series, we get after neglecting higher is shown in Fig.2 and Fig.3. This is exactly the same circuit as the basic SCDP but with a little difference in the biasing circuit. order terms and keeping only the Vin2 term, The ‘ m new ’ value can be obtained from the low value of α αδ 1+K P Vin2 2 I'0 kpVPM 1- =I0M -mqm Vin (42) biasing resistor R (Fig.2) as described below. The input CM VPM voltage, Vcm is sensed from input voltages through R cm as VPM shown in Fig.2 and this Vcm becomes the output CM voltage of provided Vin (43) δ 1+K P the first stage for the next stage of modified SCDP circuit if any. The value of R cm should be high to avoid any loading on the where α output. From Fig.2 and Fig.3, the value of Iss using equation I0M =kpVPM (44) (33) as, VP Vs1 - Vx -Vcm VP and αδ 1+K P I0M Iss= - (51) mqm = (45) R R1 R out VPM Now the biasing current from equation (26) can be rewritten as, 1 1 Vs1 -Vx +Vcm 1 1 2 = VP0 + - + + δVin (52) Iss=I0M +m new Vin2 (46) R R out R1 R R out Equation (26) includes all the effects varying with second where R is the biasing resistor, R1 is the resistor as shown in degree input differential voltage (including the effects of VP Fig.3. R out is the output resistance seen from the point P as and vth varying with Vin2 ) and (46) is rewritten from (26) only shown in Fig.3. Vs1 and Vx are the fixed potentials as shown to include higher order terms other than Vin2 term. The in Fig.3. R 2 and Vx provide the value of ( Vx -Vcm ) for INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 5 equation (51) as per Fig.3. Here R 2 is chosen to be much larger 2. The biasing resistor ( R ) should be adjusted to provide the required value of ‘ m ’ as in equation (53) for compensation. than R and R1 for reduced power consumption. 3. The value of sourcing current ( I P ) in (55) needs to be From (46) and (52), we find, 1 tuned to provide the required value of I0M as in (54). That is, 1 m new = + δ (53) the potentials Vs1 and Vx are to be chosen accordingly. Note R R out that in modified SCDP, the power dissipation is more than the 1 1 conventional SCDP due to this sourcing current and the and I0M =VP0 + -IP opamp’s power supply currents as in Fig.3. R R out (54) Note also that the quiescent current I0M also varies with differential input voltage amplitude as per equation (46). If we V -V +V Where IP = s1 x cm assume a single sinusoidal input differential voltage of R1 amplitude Va and frequency ω in Fig.2, the value of Iss is, (55) Iss=I0M +m new Va2sin 2 ωt Note that due to noise voltage changes in Vcm , the quiescent m new Va2 m new Va2 (60) current I0M varies and that changes the output common-mode =I0M + - cos 2ωt voltage. Without I P current, the low value of R leads to larger 2 2 Note here that the dc value of Iss is changed and is more variation in I0M with respect to Vcm . The circuits shown in due to the input differential voltage amplitude. At higher input Fig.2 and Fig.3 provide the value of I0M with lesser variation differential amplitudes, the dc current I0M is more and this is with respect to Vcm at dc. By differentiating I0M with respect to the reason why two transconductors based fully differential Vcm in (54) and (55), we get, circuit (Fig.4) is studied and not a single transconductor based fully differential circuit. In a single transconductor based fully I0M 1 1 V 1 = + +s Cout +2Cbs P0 - (56) differential circuit, as I0M increases there is no room to Vcm R R out Vcm R1 accommodate the increased current, I0M in M3 and M4 as the Where Cout is the output capacitance of the current source gate voltage of these two transistors is fixed (M3 and M4 block I P seen from the point P as in Fig.3 and Cbs is the operate as current sources). Hence, the output common-mode bulk-to-source capacitance of the transistor M1or M2. By voltage drops due to the channel length modulation effect. In a differentiating (19), we obtain, two transconductors based fully differential circuit, as I0M 1/α VP0 1I 1 I0M increases, the transconductance ( g m ) of M3 or M4 (M3 and =1- 0M (57) M4 are current mirrors) increases and hence the output Vcm α kp I0M Vcm common-mode voltage tries to maintain approximately at the By substituting (57) in (56), we obtain, same level. 1 1 1 + +s Cout +2Cbs - V. RESULTS ON TRANSCONDUCTORS – COMPARISON BETWEEN I0M R R out R1 CONVENTIONAL AND MODIFIED SCDP = Vcm 1 1 1 I0M 1/α 1 +s Cout +2Cbs The SPICE model library chosen for simulation is 130nm, 1+ + 1.2v, IBM Technology process. There are two examples for a R R out α kp I0M fully differential transconductor shown here, one with (58) alpha-power law characteristic and the other with square law 1/α G m α kp 1 I0M characteristics. and = 1- (59) Example 1: At higher biasing currents of SCDP, the Vcm 2 I0M α Vcm MOSFETs behave deviated from square law characteristic for By making R1 R , we have I0M that varies minimally the chosen model library. The biasing current is chosen as I0M with respect to Vcm at dc as shown in equation (58). =310uA. From model library, KP =40uA/vα, vth0 =0.366v, A fully differential circuit can be made with two single ended α =1.17 and Vdd =1.2v. The differential pair MOSFETs have SCDP circuits as shown in Fig.4. The following design W =20u and L =0.15u .The ideal value of transconductance procedure steps are required to design a compensated fully 2G m (fully differential) is 5.4mA/v. The various design differential modified SCDP transconductor. parameters used in modified SCDP are Vcm =0.65v, Vx =1.15v, 1. The value of quiescent current ( I0M ) and kp should be VP0 =71mv, R=R1 =0.12k, Vs1 =0.5328v and δ =0.59/v. From chosen to achieve the transconductance ( 2G m ) for a fully equation (50), m new =5.87mA/v2 but the realized value is differential circuit (Fig.4) as required for the given design 4.9mA/v2. specifications. INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 6 The SPICE simulated differential output current versus input for the fully differential conventional SCDP, the change is differential voltage characteristic (for input Vcm =0.65v and 2.39% . Also a change in output common-mode voltage of 6.29% is output Vcm =0.65) are shown in Fig.5 for ideal (straight line), obtained as input differential voltage amplitude is changed conventional SCDP and Modified SCDP circuits The from Vin =10mv to 300mv at input Vcm =0.65v for the fully normalized linearity errors in % vs input differential voltage are given in Fig.6 for both SCDP and modified SCDP circuits. differential modified SCDP whereas for the fully differential The transient simulations were performed with a single single transconductor based conventional SCDP, a change of sinusoidal input frequency of 100MHz and an output load 36.46% (A high change in output CM voltage!) is noticed. For this example-2, the output noise spectral voltage density capacitance of C L =10pf. The obtained % total harmonic at 100MHz is 115nv/√Hz for both conventional and modified distortion (%THD) Vs input differential voltage amplitude SCDP circuits without output capacitors. The input referred characteristics are shown in Fig.7. It is noted that at higher input noise spectral voltage density is 6.7nv/√Hz. voltages the distortion is higher for conventional SCDP than Modified SCDP. VI. THE EFFECT OF OUTPUT CONDUCTANCES A change of 4.42% change in quiescent current I0M is Consider a fully differential modified SCDP as shown in obtained for 20mv input common-mode voltage noise at Vin Fig.4. Let I D1 and I D2 be the output currents of the each single =50mv for fully differential modified SCDP whereas for the fully differential conventional SCDP, the change is 8.03% . transconductor and let g ds1 and g ds2 be the output Also a change in output common-mode voltage of 6.92% is conductances of transistors M1 and M3 (or M2 and M4) noticed as the input differential voltage amplitude is changed respectively. Let Vo1 and Vo2 be the output voltages of each from Vin =10mv to 300mv at input Vcm =0.65v for the fully ' transconductor in a fully differential circuit. Let Vo1 ' and Vo2 differential modified SCDP whereas for the fully differential be the output voltages at the opposite sides (M1 and M3) of single transconductor based conventional SCDP, the change is each transconductor. Now we have the output currents as, 62.62% (A high change in output CM voltage!). G V ' The output noise spectral voltage density at 100MHz for this example-1 transconductor design is 64.7nv/√Hz (for both 2 ' ID1 = m in +g ds1Vo1 +s C'L +2Cgs Vo1 N-g ds2 Vo1 conventional and modified SCDP) without output capacitors.The input referred noise spectral voltage density at -G V - m in +g ds1Vo1 100MHz is 3.4nv/√Hz. 2 Example 2: At lower biasing currents of SCDP, the (61) MOSFETs behave as square law characteristic for the chosen -G V ' model library. For this example, the biasing current is chosen as 2 ' ID2 = m in +g ds1Vo2 +s C'L +2Cgs Vo2 N-g ds2 Vo2 I0M =45uA. The model parameters are KP =40uA/v2, vth0 =0.366v, α =2.0 and Vdd =1.2v. The differential pair G V - m in +g ds1Vo2 MOSFETs have W =20u and L =0.15u. The ideal value of 2 2G m (fully differential) is 970uA/v. The design parameters (62) used in modified SCDP are Vcm =0.65v, Vx =1.2v, R=R1 where g m is the transconductance of transistor M3 or M4 and =0.5k, VP0 =144mv, Vs1 =0.6715v and δ =0.8/v. The realized Cgs is the gate-to-source capacitance of M3 or M4. value of m new is 1.56mA/v but its theoretical value is 2 gm where N= (63) 1.33mA/v2. g m +g ds2 The simulated output differential current versus Vin (for and C'L =CL +Co (64) input Vcm =0.65v and output Vcm =0.65v) are shown in Fig.8 where C L is the load capacitance at Vo1 and Vo2 and Co is for ideal, conventional SCDP and Modified SCDP circuits. the sum of bulk-to-drain capacitances of M2 and M4 (or M1 Fig.9 shows the normalized errors in % Vs Vin for both ' and M3) respectively as shown in Fig.2. The voltages Vo1 and conventional and modified SCDP. ' The obtained % THD Vs Vin (amplitude) characteristic is Vo2 can be obtained from, G V shown in Fig.10 for an input frequency of 100MHz and with an sC'L Vo2 + m in 1+N - g ds1 +g ds2 Vo1 output load capacitance of C L =10pf for both conventional and ' Vo1 = 2 (65) modified SCDP. For this case, there is a change of 5.8% in quiescent current g ds1 +s C'L +2Cgs N G m Vin I0M is obtained for 20mv input common-mode voltage noise at ' sCL Vo1 - 1+N - g ds1 +g ds2 Vo2 Vin =50mv for the fully differential modified SCDP whereas Vo2' = 2 (66) g ds1 +s C'L +2Cgs N INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 7 The output voltage is, Vo =Vo1 -Vo2 = ID1 -ID2 (67) sC'L Substituting equations (65), (66) and (67) in equations (61) and (62), we obtain Vo as, G m 1+N sC'L Vo = (68) g ds1 +g ds2 1+ sC'L Where N and C'L are defined in (63) and (64) respectively. The equation (68) shows the effect of various output Fig. 6. Departure from linearity in % error of Fig. 5. conductances on Vo . Using example-1 as discussed in the previous section, we have 4.48% change in Vo due to output conductances neglecting Co . For example-2 in the previous section, the change is 2.56% change due to output conductances. The discussed modified SCDP transconductor can be easily compensated for temperature by suitably adjusting the resistor R and the current I P in the biasing circuitry as in equations (54) and (55). Fig. 7. %THD Vs Vin(amplitude). Simulated at I0M=310uA, Input Vcm=0.65v, Fin=100MHz, CL=10pf and Vdd=1.2v. Fig. 5. Transfer Characteristics – ID Vs Vin. Simulated at I0M=310uA, Input Vcm=0.65v, Output Vcm=0.65v and Vdd=1.2v. Fig. 8. Transfer characteristics - ID Vs Vin. Simulated at I0M=45uA, Input Vcm=0.65v, Output Vcm=0.65v and Vdd=1.2v. INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 8 provide all the required transconductance values for the case of conventional SCDP. For modified SCDP, the resistor ( R ) and the current ( I P ) in the biasing circuit (Fig.2) are adjusted to provide all the wanted transconductances. Any suitable gain ( G ) can be achieved by independently varying G m4 . The 3dB bandwidth obtained is around 40MHz both for conventional and modified SCDP. The transient simulations were carried out for an input frequency of 100MHz with different input differential voltages. The obtained values of total harmonic distortion in % for different input voltage amplitudes are tabulated in Table.1 for both conventional and modified SCDP. Also the power dissipated by the band-pass filter circuit is tabulated in Table.1 for various Vin and for Fig. 9. Departure from linearity in % error of Fig. 8. conventional SCDP and modified SCDP. Fig. 10. %THD Vs Vin(amplitude). Simulated at I0M=45uA, Input Vcm=0.65v, Fin=100MHz, CL=10pf and Vdd=1.2v. Fig. 11. A second order Gm-C Bandpass Filter using fully differential transconductors. VII. A SECOND ORDER GM-C BANDPASS FILTER This filter can be operated at any center frequency and the As an application of modified SCDP to the filter, a higher frequency limitation is imposed by the sum of second-order continuous time Gm-C bandpass filter is bulk-to-drain capacitances ( Co ) of NMOS (M2 or M1) and constructed using both fully differential conventional SCDP PMOS (M4 or M3) in the individual transconductors as shown and Modified SCDP circuits. This circuit is shown in Fig.11. in equations (64) and (68). As long as the sum of load The transfer function of this second-order bandpass filter is capacitance and the total bulk-to-drain capacitances of M2 and given by, M4 is equal to C1 or C 2 , the circuit can operate at higher ω Gs o center frequencies. In the present BPF circuit, the circuit V (s) H(s)= o = Q (69) operates up to 960MHz as center frequency. Vi (s) 2 ωo 2 s +s +ωo TABLE I. Q THE BAND-PASS FILTER PERFORMANCE PARAMETERS STUDIED IN SECTION VII. Where G is the gain and is chosen as 1.0 at the center Performance Vin=50mv Vin=100mv Vin=250mv frequency. Parameters (amplitude) (amplitude) (amplitude) 2G m1 2G m2 ω 2G 2G Conventional SCDP ωo = = and o = m4 = m3 (70) %THD 0.166 % 0.540 % 2.295 % C1 C2 Q GC2 C2 Power Dissipation 1.90mW 1.93mW 1.97mW The various design parameters chosen are Modified SCDP ωo =2π*100.0e06 rad/sec , Q=4 , C1 =C2 =6.175pf , %THD 0.094 % 0.314 % 0.802% 2G m1 =2Gm2 =3.88mA/v and 2G m3 =2Gm4 =0.97mA/v . Power Dissipation 2.68mW 2.77mW 3.11mW The bulk-node of all the NMOS transistors is tied to ground whereas bulk-node of all the PMOS transistors is tied to Vdd . The input common-mode voltage is chosen as Vcm =0.65v. The biasing voltage ( Vb ) in the biasing circuit (Fig.1) is adjusted to INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 9 VIII. CONCLUSION [8] E.Seevinck and R.F.Wassenaar, “A versatile CMOS Linear Transconductor/Square-Law function Circuit”, IEEE J. of Solid-State A theoretical model for a source-coupled differential pair for Circuits, vol.22, pp.366-377, June 1987. alpha-power law based MOSFETs has been discussed and a [9] Z.Wang and W. Guggenbuhl, “A Voltage-Controlled Linear MOS simple design procedure for the circuit compensation technique Transconductor Using Bias Offset Technique”, IEEE J. of Solid-State Circuits, vol.25, pp.315-317, Feb. 1990. for realizing a linear SCDP transconductor was proposed. This [10] C.S.Park and R.Schaumann, “A High-frequency CMOS Linear modified fully differential SCDP has linearity much better than Transconductance Element”, IEEE Trans. On Circuits and Systems, the conventional fully differential SCDP for a wide range of Vol.33, pp.1132-1138, Nov.1986. input differential voltages. Also the variation of the quiescent [11] T-K.Nguyen and Sang-Gug Lee, “ Low-voltage, Low power CMOS operation Transconductance Amplifier with Rail-to-Rail Differential current with respect to input common-mode voltage noise was input range”, IEEE Symposium on Circuits and Systems, 2006. minimized in the proposed design. The output differential [12] Mohamed O.Shaker, Soliman A.Mahmoud and Ahmed M.Soliman., voltage dependence on the transistor output conductances has “New CMOS Fully Differential Transconductance and Amplification for been discussed. An example circuit, a Gm-C bandpass filter has a Fully-Differential Gm-C Filter”, Electronics and Telecommunication Research Institute Journal (ETRI), vol.28, No.2, April 2006. been used to verify linearity in the transconductance between [13] B.Nauta, “A CMOS transconductance-C filter technique for very high the fully differential modified SCDP and the fully differential frequencies”, IEEE J. Solid-State Circuits, vol.27, no.2, Feb.1992. conventional SCDP. A temperature compensation technique [14] Katsuji Kimura, “A Linear CMOS transconductance element of an will be discussed in a subsequent note. adaptively biased source-coupled differential pair using a Quadritail cell”, Analog Integrated Circuits and Signal Processing, vol.11, issue-2, pp.129-135,Oct.1996. REFERENCES [1] A.Nedungadi and T.R.Viswanathan, “Design of Linear CMOS Transconductance Elements”, IEEE Trans. On Circuits and Bhaskar Gopalan was born in Salem, Systems,Vol. CAS-31, No.10, Oct.1984. Tamilnadu, India in 1966. He received [2] David Johns and Ken Martin, “Analog Integrated Circuit Design”, John the B.E degree in electrical engineering Wiley & Sons, Inc., 1997. from PSG college of Technology, [3] Behzad Razavi, “Design of Analog CMOS Integrated Circuits”, McGraw Hill, Inc., 2001. Coimbatore, India and the M.Tech [4] R.Jacob Baker, Harry W.Li, and David E.Boyce, “CMOS – Circuit degree in electrical engineering from Design, Layout, and Simulation”, IEEE Press, 1998. Indian Institute of Technology, Kanpur, [5] T.Sakurai and A.R.Newton, “A simple MOSFET model for circuit India in 1987 and 1989 respectively. He analysis”, IEEE Trans. on Electron Devices, vol.38, no.4, Apr.1991. [6] Bhaskar Gopalan, “A Linear CMOS Transconductance Element”, worked at many companies including ITI, Intergraph, WIPRO International Journal of Design, Analysis and Tools for Integrated in India and Infineon Technologies Asia Pacific in Singapore. Circuits and Systems,Vol.3, No.2, Nov.2012. Currently he is an independent Technical Consultant in India. [7] K.Bult and H.Wallinga, “A class of Analog CMOS Circuits based on the square-law characteristics of a MOS transistor in saturation”, IEEE J. of His research interests include low-power Solid-State Circuits, vol.22, pp.357-365, June 1987. Analog/Mixed-signal/RF/Digital IC design and EDA work. INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 10 Software Risk Management Practice: Evidence From Thai Software Industry Tharwon Arnuphaptrairong Abstract—Software risk management has been around at least between theories and practices, and lead to the software project since it was introduced in mainstream of software management success. process, in 1989 [1]-[3] but little has been reported about its This paper is organized as follows. Section II gives the industrial practice [4]-[6]. This paper reports the current software review of software risks fundamental suggested in the literature. risk management practice in Thai software industry. A Section III discusses the research methodology. Section IV questionnaire survey was designed to capture the information of presents the findings of the survey and the conclusion and the software project risk management practice. The questionnaire was sent to 141 companies and received a response rate 28 percent. discussion are given in section V. The findings indicate that Thai software firms do not neglect software risk management. However, the results also show the II. OVERVIEW OF RELATED LITERATURE discrepancy between standard risk model and industrial practice. This section reviews the literature related to the proposed The industrial has not implemented all the risk management research objectives i.e., software risks, software risk activities prescribed in the standard risk model. Thai software management, software risk management process model, roles firms seem to give more attention to risk identification, risk analysis, risk management planning, and risk monitoring and and responsibility, software risk management problems and control but left out other two phrases--risk sign-off, and risk barriers, and empirical study in software risk management post-mortem analysis. This is similar to the findings of practice and barriers. Kajko-Mattsson and Nyfjord [5]. Regarding the software risk A. Software Risks management barriers, only two barriers --1) mitigation actions may require organization or process changes, and 2) visible The term risk is generally used in many different domains. In management cost get more attention than intangibles were rated the “software” context, several definitions can be found. For higher than 3 out of 5 point scale. These reported barriers reaffirm example, Leihman and VaanBuren [7] defines risk as “A that we need to provide evidence for Thai software industry to possible future event that, if it occurs, will lead to an undesirable justify the risk management effort, and the linkage with the outcomes.” project success to encourage the motive. PM-BOK (Project Management Body of Knowledge) defines Index Terms—software risks, software risk management, risk as: “an uncertain event or condition that, if it occurs, has a software risk practice, software risk management practice, positive or negative effect on a project’s objectives [8].” software risk barriers, software risk management problems Whereas PRINCE2, the UK government sponsored project software risk evidence. management standard defines risk as: “the chance of exposed to the adverse consequences of future events.” And in all, risks are I. INTRODUCTION related to 2 key elements: future events, and may cause effects [9]. S OFTWARE risk management is a complex activity and also a major contributor to the software project success. Since it was introduced in mainstream of software management process, Software risk management is a complex activity. It has to deal with uncertain events of the software project and their causes. in 1989 [1]-[3], both the academic and the software industry are Researchers have tried to overcome this obstacle by suggesting well aware of its significance. Research about risk dimensions, the fundamental steps or phrases to handle them. This is known risk factors, top ten risk management and a number of as “software risk management process model.” established standard models, frameworks and theories have B. Software Risk Management been suggested. However, very a little empirical evidence about Software risk management can be defined as “the way to the status of its practice has been reported [4]-[6]. handle risks in a software project”. Its objective is to reduce The objective of this research is to study the state of the uncertainties and impacts associated with certain tasks in the practice of software risk management including problems and project. The fundamental software risk management consists of barriers facing the Thai software industry. 4 major processes: 1) risk identification, 2) risk analysis, 3) risk Understanding the state of the practice and the barriers will planning, and 4) risk monitoring and control [5], [8], [10]. give incitements which hopefully will help closing the gap 1) Risk Identification Risk identification deals with the process of determining Manuscript received December, 24, 2013. which software risk factors that might affect the software project. Tharwon Arnuphaptrairong, Department of Statistics, Faculty of Commerce The software risk factors can be elicited using various and Accountancy, Chulalongkorn University, Thailand INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 11 techniques. These include: Risk acceptance is to accept or do nothing to deal with a a) interviewing/brainstorming with project team members, particular risk. experts, customers, and other stakeholders, or Risk avoidance is to take action to prevent risk events from b) Delphi method – a technique to reach the consensus of occurring so that if they occur there will be little impact. participants on software risk factors anonymously. Risk mitigation is to take early action to reduce the risk In the elicitation process, in order to determine the related probability or to protect from its impacts. risk factors, the process may use various tools, including risk Risk transference is to shift the responsibility of the checklists [11-13], the top ten software risks check lists [1], or consequences of a risk to a third party. risks dimensions/categories [14]. One may use the risk Besides the risk response plan, control and monitoring checklists available from the literature or from organization plan and contingency plan may be included in the risk planning own repository of risk lists. Many risk checklists can be found in process. The control and monitoring plan describes relevant the literature [15]. procedures and measures in order to control and monitor the In their recent experimental study, Han and Huang [11] risks. Contingency plan defines a secondary or alternative gave a comprehensive review on software risk lists. Risks were course of action to be taken in the event that the primary reviewed from 12 studies. Table I shows the details of the approach fails to function as it should. studies and number of risks reviewed from [11]. 4) Risk Monitoring and Control Risk monitoring and control is the process of keeping track TABLE I of the registered risks according to the control and monitoring SUMMARY OF SOFTWARE RISK RESEARCH [11] plan. The purpose is to make sure that all risk responses have AUTHOR(YEAR) DIMENSION NUMBER OF OF RISKS SOFTWARE RISKS been implemented, observe the risk status and take action as McFarlan (1981) 3 54 specified in the risk response plan and record the risk status in Boehm (1991) 0 10 the risk register. Barki et al. (1993) 5 55 However, in addition to these 4 steps above, two more Summer (2000) 6 19 process are also suggested --5) risk sign-off and 6) risk Longstaff et al.(2000) 7 32 post-mortem analysis [5]. Cule et al. (2000) 4 55 5) Risk Sign-off Kliem (2001) 4 38 The status of the risk likelihood and its impact should be Schmidt et al. (2001) 14 33 monitored onto the risk register. For the risk that is mitigated, Houston et al. (2001) 0 29 this process is to update the status and remove it from the risk Murti (2002) 0 12 list and sign it off. Sometimes, this step may be seen as a part of Addision (2003) 10 28 the risk monitoring and control. Carney et al. (2003) 4 21 6) Risk Post-Mortem Analysis This process is to evaluate the risk management process Finally, the software risk factors that all the parties involved and its results when a project has been completed. Review agreed upon should be produced and recorded in a “risk should be conducted to see the effectiveness on how the risks register”. identified, analyzed, planed, managed and monitored. The 2) Risk Analysis lessons learned can then be used on other projects to aid their The next process is to analyze and prioritized the identified risk management. software risk factors. The process is to assess the impact and the probability that the identified risk will lead to the undesirable C. Software Risk Management Process Model or Framework outcomes. The risk exposure is then obtained by multiplying the Software risk management process models specify stepwise risk impact with its probability. The analysis may use other tasks in order to manage risks of the software project [4]. There techniques such as risk sensitivity analysis, decision tree and are various software risk management models. They usually scenario analysis [8]. The identified risks are then ranked centered around the principle and practice of four major according to the risk exposure calculated to create the processes mentioned before –1) risk identification, 2) risk prioritized risk list and confirmed by the stakeholders [5], [8], analysis, 3) risk planning, and 4) risk monitoring and control. [10]. Whilst the software risk management process model in 3) Risk Planning Kajko-Mattsson and Nyfjord [5] comprises of 6 phrases –1) risk The next step is the process of developing a risk response identification, 2) risk analysis, 3) risk planning, 4) risk or risk management plan. The risk response plan consists of monitoring and control, 5) risk sign-off and 6) risk post-mortem strategies, options or alternative actions and actions in response analysis. Well known risk management model or framework to the prioritized risks. Generally the risk response strategies includes Boehm [1], SEI’s software management model [16] aim at reducing or eliminating the probability of the prioritized and Kontio’s Riskit methodology [17, 18]. risks, or minimize the impact of the risks if they are realized. According to Boehm [1] risk management consists of two There are four common strategies in response to the software steps –risk assessment and risk control. Risk assessment risks --acceptance, avoidance, mitigation, and transference. contains risk identification, risk analysis, risk prioritization INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 12 whereas risk control involves risk management planning, risk 8. Overconfidence (e.g. risks are already taken care of, resolution procedure, and risk monitoring. Riskit [18] consists implicitly), of risk management mandate, goal review, risk identification, 9. Fatalism (e.g. software is always late anyway; there is no risk analysis, risk control planning, risk control and risk way to change that. monitoring. SEI’s software management model [16] F. Empirical Study in Software Risk Management Practice encompasses identify, analyze, plan, track, control, and and Barriers communicate. These frameworks also recommend different techniques, for example, to identify risks for software project, Lack of empirical study in software risk management Boehm [1] recommended risk checklists, decision drivers, practice was discussed in the literature [4]–[6], [17]. assumption analysis, or decomposition. Riskit [18] In their review of literature of different techniques for risk recommended brainstorming, checklist or benchmarking management in the area of software engineering, Misra et al. [17] whereas SEI recommended risk taxonomy questionnaire concluded that “there is a lack of understanding of the area method [16]. amongst the software engineering practitioner” and “many of There are many prominent risk management standards, the approaches discuss in this article are limited by the lack of models, or guidelines available in literature and practice. empirical study” Example models are CMMI (RSKM model), Continuous risk Kajko-Mattsson and Nyfjord [5] stated that “Despites the management (CRM), ISO/IEC guide, ISO 9000, ISO fact that risk management has been with us for some time, little 9001:2000, Project Management Body of Knowledge has been reported about its industrial status.” Bannerman [4] (PMBOK), Prince 2, and IEEE [4, 5]. and Odzaly et al [6] also called for more empirical software risk management practical evidence. D. Roles and Responsibility In Kajko-Mattsson and Nyfjord [5], by using a Project managers are generally responsible for the whole convenience sampling, international master program students software risk management process. After risks are identified and were asked to choose to interview an organization that has risk prioritized they may be assigned to the responsible persons or management process in place, in their home country. Data from risk owners [5]. 37 organizations were collected and analyzed. The results show discrepancies between industrial practices and the standard E. Software Risks Management Problems and Barriers models prescribed in the literature. Organizations studied did Odzaly et al. [6] showed evidence from reviewing of the not implement important process as prescribed in the literature. literature that risks are not well understood, there are too many On the other hand, standard model fails to identify some risks to manage, risk management is difficult due to complexity important risk management activities. Only a few have and there is a lack of motivation to perform risk management. implemented the entire process of software risk management. Odzaly et al. [6] found 4 reported problems in the literature. Organizations mainly implemented risk identification and risk 1. Handling risk is difficult due to complexity, analysis process. Many problems were indicated. The first 2. Risks are not well understood, mentioned problem was with employees’ attitude toward risk 3. There are too many risks to manage within resource management. Employees were described as do not take the risk limitation, management seriously. Other problems were related to 4. A lack of motivation among developers to perform risk experience of risk managers, tools, resources, formal procedure, management. process standardization, knowledge management, and In his survey, Odzaly et al. [6] used Dedolph’s reported 9 documentation. Suggestions regarding risk categorization, roles, barriers [19]. The respondents were asked to rank the following risk activities and phrases, risk recording, risk for specific type nine barriers: and organization were introduced. 1. Visible management cost get more attention than Bannerman [4] studied risk management practice in intangibles, government sector in an Australian state. Structured interview 2. The value of risk management cannot easily be proved; with 23 informants from 17 organizations on 17 projects were the saving do not seem real, conducted. The findings were similar to the study of 3. Project teams are too busy fire-fighting; there are no Kajko-Mattsson and Nyfjord [5], as he put “software risk resources available for any extra work, management is under-performed in practice.” The findings 4. Risk management –particularly formal methods with a challenge some conventional concepts of risk management and high initial overhead – seems difficult, project management. For example, it was found that software 5. Project teams and managers are rewarded for projects do not conform to a uniform structure, as assume in problem-solving, not prevention, much of the literature and as they mentioned “Risk management 6. Mitigation actions may require organization or process research lags the needs of practice, and risk management as changes, practiced lags the prescription of research”. 7. Discussing risks goes against cultural norms (brining up Odzaly et al. [6] showed evidence from reviewing of the potential issues is viewed as negative thinking or as literature that risks are not well understood, there are too many causing conflict within the group), risks to manage, risks management is difficult due to complexity INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 13 and there is a lack of motivation to perform risk management. TABLE II QUESTIONS They used an on-line questionnaire to study Dedolph’s reported Part 1: General information 9 barriers of software risk management. The perception data of 1. Organization Name: 18 project managers from 12 companies about the nine barriers Organizational Size (Number of employee) was collected. The research showed a good awareness of (Number of developers) 2. Respondent Position software risk management but with low tool usage. The main Experience (number of year) in project management barriers of software risk management are related to perception Part 2: Software Risk Management Practice of its high cost but low value. Risk identification and risk 3. Does your organization follow/ use/ have a software risk management analysis are especially perceived as effort extensive and costly. process? 4. Is there any standard Risk Management Model in place? They suggested the values of cost ratio for software risk 5. Does your organization carries out (please rate how widespread in your management needed to be proved. in your projects?) 6. If you perform risk identification in you organization, in the risk III. THE PROPOSED METHODOLOGY identification process, which of the following techniques your organization utilizes (can check more than one item)? A. Survey Design 7. If you perform risk analysis in you organization, in the risk analysis process, which of the following techniques your organization utilizes? The survey method was used to obtain the information of the 8. Who is responsible for software project risk management? software risk management practice from the Thai software 9. Does your organization assigned software to risk owners? industry. About 200 software companies that joined Software 10. Does your organization follow/ have any risk management standard industry club of The Federation of Thai Industries (FTI) were or model? 11. Does your organization use any tool to support the following step? used for the survey frame. In the data collection process, names, 12. Does your organization use risk register? addresses and contacts of software firms were obtained from 13. Does your organization record risk management at the following FTI. An officer at The Federation of Thai Industries (FTI) was step? asked to help in contacting and solicitation in order to increase Part 3: Software Risk Management Problems and Barriers 14. Please rate the following statement (risk barriers) where most the response rates. The software firms were contacted by e-mail appropriate to your organization practice from 1.Strongly disagree (SD) and asked to participate in the research. If the software company 2. Disagree (D) 3. Indifferent (IND) 4. Agree (A) 5. Strongly agree (SA) agreed to participate, the questionnaire was sent for the software 15. To what degree you agree on the following software risk project risk management data needed. problems, please circle the response that the best represents you opinion where 1. Strongly disagree (SD) 2. Disagree (D) 3. 141 companies agreed and 40 questionnaires were Indifferent (IND) 4. Agree (A) 5. Strongly agree (SA) returned. This is a response rate of 28 percent. TABLE III B. Questionnaire Design THE NUMBER OF FIRMS WITH RISK MANAGEMENT PRACTICE General information about the software firms and the Risk management Practice Frequency Percentage respondents were obtained from the first part of the Risk management process is embedded 29 72.5 questionnaire. The second part of the questionnaire was in the project management process Risk management process is 2 5.0 designed to obtain the information regarding the software risk maintained as a separate process management practice of the software firms. 15 questions Do not have risk management process 9 22.5 included in the questionnaire are shown in Table II. Total 40 100.0 C. The Profile of the Respondents TABLE IV As shown in Table III, of the 40 questionnaires returned, THE COMPANIES’ AND RESPONDENTS’ PROFILE 31 companies (77.5%) answered that their organizations have a Frequency Percentage Number of Employees software risk management process. Therefore the other 9 1 - 16 15 48.39 organizations that answered that they do not have software 17 - 32 9 29.03 management process were excluded from further analysis. more than 32 6 19.35 Profile of the 31 companies and respondents are given in missing 1 3.23 Table IV. Most of the companies are of small to medium size. Number of Developers 1-6 15 48.39 48.39 percent of the companies have the number of employees 17 - 12 8 25.81 of 1 to 16 and 29.03 percent of the companies have the number more than 12 8 25.81 of employees of 17 to 32. The average number of employee is Position 70.26. manager 14 45.16 committee 1 3.23 48.39 percent of the companies the companies have the consultant 2 6.45 number of developers from 1 to 6, and 25.81% percent of the employee 13 41.94 companies the companies have the number of developers from 7 missing 1 3.23 to 12. The average number of developer is 9.7. Work Experience (Years) 1–5 17 54.84 6 - 10 9 29.03 more than 10 2 6.45 missing 3 9.68 INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 14 Most of the respondents are project managers (45.16%). 54.84 percent have the experience in project management from RISK MANAGEMNT PRACTICE 1 to 5 years and 29.03 percent have the experience in project 40 management from 6 to 10 years. The average years of work 30 experience is 5.54 years. 20 10 IV. FINDINGS 0 Risk… Risk… Risk… Risk… Risk… Risk… Risk Post-… The findings are reported in two sections. The first section Risk Sign-off discusses the findings of the state of practice of software risk management, which includes the adoption software risk management processes --the risk identification, risk analysis, risk prioritization, risk management planning, risk resolution, risk monitoring, risk sign-off and risk post-mortem analysis; risk roles and responsibility; risk owner; risk management standard or model; risk management tools; and risk documentation. The second section discusses the perceptions on Fig. 1. Software Risk Management Practice the problems and barriers reported in the survey. Table VI, where: a is every project (100%), b is almost all A. The Software Risk Management State of Practice (80 – 99 %), c is some (60 – 79 %), d is a few (40 – 59 %), and e is very few (less than 40 %), shows that the robustness of the Table V and Figure 1 shows the state of practice software practice of software risk process. Most of the answer of these project risk management process of all of the 31 companies. phrases fall into a (every project), b (almost all), and c (some) From observation of the frequency, the state of practice can be except the practices of risk sign-off and risk post-mortem are divided of three groups. The first group --risk identification, risk spread out. Analysis and risk management planning, the frequency is about 30 out of 31 while the second group -- risk prioritization, risk TABLE VI SOFTWARE RISK MANAGEMENT PRACTICE resolution and risk monitoring, the frequency is about 25 out of Phrase a b c d e 31. The last group --risk sign-off and risk post-mortem analysis Identification 12 7 6 2 1 the frequency are 20 and 15 out of 31 respectively. Analysis 11 9 4 2 2 Prioritization 9 4 5 2 1 TABLE V Management Planning 9 9 4 3 3 THE SOFTWARE RISK MANAGEMENT PRACTICE Resolution 7 6 5 1 4 Phrase Frequency Percentage Monitoring and Control 8 8 3 2 4 Risk Identification 30 96.8 Sign-off 6 5 5 - 3 Risk Analysis 31 100.0 Post-Mortem Analysis 2 2 3 4 3 Risk Prioritization 24 77.4 Risk Management Planning 30 96.8 TABLE VII Risk Resolution 25 80.6 THE USE OF IDENTIFICATION TECHNIQUES Risk Monitoring 26 83.9 Technique Frequency Percentage Risk Sign-off 20 64.5 Check Lists 21 70.0 Risk Post-Mortem Analysis 15 48.4 Top Ten Lists 5 16.7 Risk Dimensions 3 10.0 1) Risk Identification Practice Interview 7 23.3 To identify software risks, 22 and 21 out of the 30 Brain Storming 22 73.3 Delphi Method 1 3.3 respondents answered that they use brainstorming and check lists techniques respectively while the least used techniques are TABLE VIII Delphi method and risk dimensions respectively (Table VII). THE USE OF RISK ANALYSIS TECHNIQUES 2) Risk Analysis Technique Frequency Percentage To performing risk analysis, decision analysis is the most use Risk Exposure 14 45.2 method (22 out of 31) while risk exposure is second (14 out of Decision analysis 22 71.0 31) (Table VIII). Others 4 12.9 3) Risk Management Planning Regarding risk management planning process, risk plan and TABLE IX THE USE OF RISK MANMENT PLANNING TECHNIQUES contingency plan are the two most popular planning tools used Technique Frequency Percentage (Table IX). 15 companies (48.4%) used risk plan and 14 Risk Plan 15 48.4 companies (45.2%) used contingency plan. Risk resolution/ Strategy 10 32.3 Contingency Plan 14 45.2 Others 1 3.2 INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 15 4) Risk Roles and Responsibility B. Risk Management Problems and Barriers Regarding risk roles, 25 out of 31 respondents (80.6%) Table XII shows mixed perception on all the four identified project manager as the person responsible for problems –1) Handling risk is difficult due to complexity, 2) software project risk management. The other 6 respondents Risks are not well understood, 3) There are too many risks to answered that there are more than one person responsible for the manage within resource limitation, and 4) A lack of motivation software project risk management. They are project manager among developers to perform risk management. For example, and client manager, project manager and teamwork, project for the first problem -- Handling risk is difficult due to manager, project coordinator and developer, and project complexity, while 7 out of 31 or about one fourth perceived as manager, executive and development managers. 5) Risk Owner disagree, 11 out of 31 or about half perceived as agreed or Concerning risk owner, 19 out of 31 respondents (61%) strongly agree. There are also 8 out of 31 or another one fourth identified that they assigned software risks to risk owners while showed indifferent. The data exhibits the same pattern for the 12 (38.7%) did not have risk owners. other three problems with average perception of about 3.34 and 6) Risk Management Standards or Models there is no statistical significant different. 12 out of 31 respondents (38.7%) identified that they It may be concluded that on all four problems the majority followed some risk management standards or models while 18 of the respondents trend to agree that these are software risk out of 31 respondents (58%) did not have any risk standard or management problems facing their organization. But the data do model. 5 out of the 12 respondents reported that they used not show strong consensus. CMMI (RSKM) and 4 respondents used ISO/IEC 29110, 1 respondent reported that it used CRM, 1 answered that it used TABLE XII all ISO/IEC guide, ISO9000, and ISO 9001:2000 and 1 FREQUENCY OF THE RESPONDENTS ON LEVEL OF THE PERCEPTION OF answered that it used both CRM and PMBOK. THE PROBLEMS 7) Risk Management Tools SD D IND A SA n/a Mean Table X shows that about 13 out of 31 the respondents Problems Handling risk is -- 7 8 11 3 2 3.34 (41.94%) used some tools in managing risks except for risk difficult due to sign-off and risk post-mortem analysis. There are only 8 (or complexity 25.8%) and 6 (or 19.4%) out of 31 respondents reported the use Risks are not well 1 5 9 14 -- 2 3.24 of risk management tools. Reported tools vary. Microsoft excel understood There are too -- 5 12 9 3 2 3.34 is the most frequent reported tools with frequency of only 2, for many risks to every phrase of the software risk management phrases. manage within 8) Risk Documentation resource 16 out of 31 respondents (51.61%) answered that they used limitation risk register in their companies. Table XI shows the frequency A lack of 1 6 7 11 4 2 3.38 motivation and percentage of the risk recording for each software risk among management phrases. The frequency varies from 20 to 26 developers to except at the risk sign-off and risk post-mortem analysis phrase. perform risk TABLE X management RISK MANAGEMNT TOOLS Phrase Frequency Percentage Table XIII shows that only two barriers –1) Mitigation Risk Identification 13 41.9 actions may require organization or process changes and 2) Risk Analysis 13 41.9 Risk Prioritization 13 41.9 Visible management cost get more attention than intangibles Risk Management Planning 14 45.2 have the mean value higher than 3. In other words, the Risk Resolution 13 41.9 respondents trend to agree with the two barriers while they Risk Monitoring 14 45.2 disagreed or strongly disagreed with the other seven barriers. Risk Sign-off 8 25.8 For these seven barriers, the average perception ranges from Risk Post-Mortem Analysis 6 19.4 1.41 to 2.83. TABLE XI For the first barriers --Mitigation actions may require RECODRING RISK organization or process changes with the average perception of Phrase Frequency Percentage 3.45, 15 out of 31 or about half perceived as agreed or strongly Risk Identification 24 77.42 agreed and 11 out of 31 or about one third perceived as Risk Analysis 26 83.87 indifferent. Risk Prioritization 20 64.52 For the second barriers -- Visible management cost get Risk Management Planning 24 77.42 Risk Resolution 23 74.19 more attention than intangibles with the average perception of Risk Monitoring 23 74.19 3.41, 15 out of 31 or about half perceived as agreed or strongly Risk Sign-off 17 54.84 agreed and 8 out of 31 or about one third perceived as disagreed. Risk Post-Mortem Analysis 14 45.16 INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 16 V. CONCLUSION AND DISCUSSION risk post-mortem analysis. However, Kajko-Mattsson and In 2003, Deldolph [19] discussed a number of reasons why Nyfjord [5] indicated that these two processes are of great software risk management is neglected. However, this study important for the long term effective software risk management. uncovers a different evidence in Thai software industry. From Regarding risk management problems and barriers, for all four the 40 questionnaires returned, 31 companies (77.5%) answered problems reviewed from the literature, the majority of the that their organizations have a software risk management respondents from Thai software industry trend to agree that process. After 10 years, this may indicate that software risk these are software risk management problems facing their management is not anymore ignored. organizations but the data do not show strong agreement. The The general picture of the software risk management of Thai perceived agreement on the barriers ranges from 3.24 to 3.28 software firms can be concluded as the followings: out of 5. 1. Of the 40 questionnaires returned, 77.5% answered their TABLE XIII organization have a software risk management process. FREQUENCY OF THE RESPONDENTS ON LEVEL OF THE PERCEPTION OF 2. The state of practice are of three groups. About 30 out of 31 THE BARRIERS perform risk identification, risk analysis and risk SD D IND A SA n/a Mean management planning while about 25 out of 31 practice Problems Visible management 1 8 3 9 6 4 3.41 risk prioritization, risk resolution and risk monitoring and cost get more the least practice phrases are risk sign-off and risk attention than post-mortem analysis with the frequency of 20 and 15 out intangibles The value of risk 6 10 8 5 -- 2 2.41 of 31 respectively. management cannot 3. 22 and 21 out of the 30 respondents (73.3% and 70%) easily be proved; the identified that they use brainstorming and check lists saving do not seem real techniques respectively. Project teams are too 2 13 7 7 -- 2 2.66 4. In performing risk analysis, decision analysis is the most busy fire-fighting; used method (71.0%). there are no resources 5. Regarding risk management planning process, risk plan and available for any extra work contingency plan are the two most popular planning tools Risk 2 10 10 6 1 2 2.79 used (48.4% and 45.2% respectively). management –partic 6. 80.6% of the respondents identified project manager as the ularly formal methods with a high person responsible for software project risk management. initial overhead – 7. 61% of the respondents identified that they assigned seems difficult software to risk owners. Project teams and 7 5 9 7 1 2 2.66 8. 12 out of 31 respondents (38.7%) identified that they managers are rewarded for followed some risk management standards or models while problem-solving, not 18 out of 31 respondents (58%) did not have any risk prevention. standard or model. Mitigation actions 1 2 11 13 2 2 3.45 may require 9. Only 13 out of 31 the respondents (41.94%) used some organization or software tools in managing risk. process changes 10. 16 out of 31 respondents (51.61%) answered that they used Discussing risks goes 10 13 3 3 -- 2 1.97 risk register in their companies. against cultural norms (brining up The general picture above shows that Thai software firms potential issues is seem to give more attention to risk identification, risk analysis, viewed as negative risk management planning, risk monitoring and control and left thinking or as causing conflict out other two phrases -risk sign-off, and risk post-mortem within the group) analysis. Figure 2 shows that it is more or less similar to the Overconfidence (e.g. 2 8 12 7 -- 2 2.83 findings of Kajko-Mattsson and Nyfjord [5]. risks are already This indicates the discrepancy between theory and practice as taken care of, implicitly) suggested in Kajko-Mattsson and Nyfjord [5], as they put it that Fatalism (e.g. 21 5 2 1 -- 2 1.41 the industry studied has not implemented all the activities software is always prescribed by model found in the literature. late anyway; there is no way to change that To explain this phenomenon, it is hypothesized that the two Others reasons (there -- -- -- -- 1 30 1 phrases -risk sign-off, and risk post-mortem analysis are seen are errors anyway from the industry as less significant. This is because most of the after the software is completed ) literature covered only four major processes –1) risk identification, 2) risk analysis, 3) risk planning, and 4) risk monitoring and control and similarly left out risk sign-off, and INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 17 But when considering the weight of the perception, only two out of nine barriers –1) Mitigation actions may require organization or process changes, and 2) Visible management cost get more attention than intangibles, have the mean perception value higher than 3. The most important barrier perceived in Thai software firms is “mitigation actions may require organization or process changes”. It implies an unacceptable cost to management in implementing risk management process. Mitigation actions may require organization or process changes. This also suggests that resistance to change may be a bigger problems in the risk Fig. 2. Comparison between findings management process. The second most important barriers --visible management cost get more attention than intangibles, Regarding barrier perception, the findings of this study in implies that when compare to other activities that perceived as Table XIV demonstrate a comparable pattern compare to results higher values, risk management can be sacrificed for them. from Odzaly et al. [6]. Odzaly et al. [6] argued that barriers A to These reported barriers reaffirm that we need to uncover F are cost related while barriers G to risk I are behavior related evidence for Thai software industry in order to justify the risk or attitude related risks. The findings shows that cost related management effort and to encourage for the motive. barriers (A-F) are ranked higher than behavior related risks (G –I). The difference in this study to the findings of Odzaly et REFERENCES. al. [6] is that barrier G (Overconfidence e.g. risks are already [1] B.W. Boehm. “Software Risk Management: Principles and Practices,” taken care of, implicitly) is ranked third in this study while it IEEE Software, vol. 8, number 1, pp.32-41, 1991. was rank seventh in Odzaly et al. [6]. [2] R.N. Charette. Software Risk Analysis and management, McGraw-Hill, In the ranking view, the findings show most cost related New York, 1989. [3] B. Freimut, S. Kartkopf, J. Kontio, and W. Kobitzsch. “An Industrial barriers (A-F) are ranked higher than behavior related risks Case Study of Implementing Software Risk Management,” ESEC/FSE (G –I). This indicates that the value to cost ratio is perceived as 2001, Vienna, Austria, 2001. major difficulty. In other words, the barriers of risk management [4] P.L. Bannerman. “Risk and Risk Management in Software Projects: A reassessment,” The Journal of Systems and Software, vol. 81, process is the perception of its values to its costs justification. pp.2118-2133, 2008. [5] M. Kejko-Mattson and J. Nyfjord. “State of Software Risk Management Practice,” IAENG International Journal of Computer Science, vol. 35, TABLE XIV number 4, November 2008. RANKED BARRIERS [6] E. E. Odzaly, D. Greer, and P. Sage. “Software Risk Management Rank Barriers Mean Odzaly [6] Barriers: an Empirical Study,” in Third International Symposium on (Rank) Empirical Software Engineering and Measurement, Florida, pp. 418–421, 1 Mitigation actions may require 3.45 3(C) 2009. organization or process changes [7] R. Leihman, and J. VaanBuren. "The Risk of Not being Risk Conscious: 2 Visible management cost get 3.41 1(A) Software Risk Management Basics,” STSC Seminar Series, Hill AFB, more attention than intangibles UT. 3 Overconfidence (e.g. risks are 2.83 7(G) [8] Project Management Institute, A Guide to the Project management Body already taken care of, implicitly) of Knowledge (PMBOK), 3rd Ed. ANSI/PMI 99-001-2004, PMI, Newton Square, PA, 2004. 4 Project teams are too busy 2.79 2(B) [9] B. Hughes, and M. Cotterell. Software Project Management 5th ed, pp. fire-fighting; there are no 163, McGraw-Hill (UK), 2009. resources available for any extra [10] IEEE 1540, IEEE 1540 Standard for Lifecycle Process-Risk Management, work IEEE New York, NY, 2001. 5 Risk management –particularly 2.66 4(D) [11] W.M. Han and S.J. Huang. “An Empirical Analysis of Risk Components formal methods with a high and Performance on Software Projects,” The Journal of Systems and initial overhead – seems difficult Software, vol. 80, number 1, pp. 42-50, 2007. 6 Project teams and managers are 2.66 6(F) [12] L. Wallace and M. Keil. “Software Project Risk and their Effect on rewarded for problem-solving, Outcomes,” Communication of the ACM, vol. 47 number 4, pp. 68-73, not prevention. 2004. 7 The value of risk management 2.41 5(E) [13] R. Schmidt, K. Lyytinen, M. Keil, M. and P. Cule. “Identifying Software cannot easily be proved; the Project Risks: An International Delphi Study,” Journal of Management saving do not seem real Information Systems, vol. 17, number 4, pp. 5-36, 2001. 8 Discussing risks goes against 1.97 8(H) [14] K. Lyytinen, L. Mathisen, and J. Ropponen. "A Framework for Risk cultural norms (brining up Management," Journal of Information Technology, vol. 11 number 4, potential issues is viewed as pp.275-285, 1996. negative thinking or as causing [15] T. Arnuphaptrairong. “Top ten lists of software project risks: Evidence conflict within the group) from the literature survey,” Proceedings of The International 9 Fatalism (e.g. software is always 1.41 9(I) Multi-Conference of Engineers and Computer Scientists 2011, late anyway; there is no way to pp.732-737, 2011. change that [16] Software Engineering Institute/Canegie Melon University (CMI/SEI), Average 2.62 "Software Risk Management," INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 18 URL:http://www.sei.cmu.edu/library/abstracts/reports/96tr012.cfm, Access May 2011. Tharwon Arnuphaptrairong is An [17] S. C. Misra, V. Kumar, and U. Kumar. "Different Techniques for Risk Management in Software Engineering: A Review," SAC Conference, Assistant Professor in Business Information pp.196-205, 2006. Technology at the Department of Statistics, [18] J. Konito. Software Engineering Risk Management: A Method Faculty of Commerce and Accountancy, Improvement Framework, and Empirical Evaluation, Ph.D. Thesis, Chulalongkorn University, Thailand. He Department of Computer Science and Engineering, Hensinki University of Technology, Finland, 2001. received a B.Sc. Degree in Statistics from [19] F.M. Dedolph. “The Neglected Management Activity: Software Risk Chulalongkorn University, a M.Sc. in Computer Applications Management,” Bell Labs Technical Journal, vol. 8, Issue 3, pp.91-955, from Asian Institute of Technology, Bangkok, Thailand, and a 2003. Ph.D. Degree in Management Sciences from University of Waterloo, Canada. His research interests include Software Project Management, Software Risk Management, Software Cost Estimation and Empirical Software Engineering. INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 19 Intellectual Green Wave Cloud for Traffic Control: Challenges and Proposed Solutions Vladimir Hahanov, Wajeb Gharibi, Eugenia Litvinova, Svetlana Chumachenko, Olesya Guz, Ka Lok Man, Abstract—A cloud service “Green Wave” for an intelligent road infrastructure is proposed to monitor and control traffic in real-time through the use of traffic controllers, RFID-tagged cars, and cloud based services. The proposed infrastructure aims to improve the quality and safety of vehicle movement as well as to minimize the time and costs when vehicles are moved at specified routes. In this paper, we propose a set of innovative scientific and technological solutions for solving social, human, economic and environmental problems associated with creation and use of a cloud for monitoring and management. All of these solutions are integrated into the model of real-time interaction between monitoring and management clouds, vehicles and road infrastructure. In this paper we describe in details of the model. Index Terms—Cloud Computing, Distributed Computing, Radar and Radio Navigation, RFID, Traffic Monitoring, Wireless Sensor Networks. I. INTRODUCTION AND BACKGROUND C ORPORATE networks, personal computers and individual services (software) are currently opting to go to the "clouds" of a cyberspace, which have an obvious tendency to Fig. 1. Virtualization of the real world. partition the Internet for specialized services (see Fig. 1). If today’s 4 billion users are connected in the Internet (1 There are several advantages of using cloud services and zettabytes = 1021 = 270bytes) by means of about 50 billion they lie primarily in the fact that the microcells and gadgets, in five years each active user will have at least 10 macronetworks in the clouds are invariant with respect to the devices for connecting in cyberspace. The use of personal numerous gadgets of each user or corporation. Cloud computers without much replication of data stored in these components can potentially solve almost all the problems of devices becomes impossible. But even simple copying requires reliability, safety, and service, while at the same time they more nonproductive time for servicing systems and projects, practically do not have major disadvantages. As corporations which can reach 50% if several devices or servers with identical and users migrate to the clouds, protection of information and functions are available. Unprofessional (bad) service of such other cyber components from unauthorized access, destructive equipment creates problems with reliable data retention and penetrations and viruses will be of importance. It will be also with unauthorized access. Similarly, there is a problem of necessary to create services that are reliable, testable and remote access to the physical devices when migrating users in protected from the unwanted penetrations to the cyberspace the space, and it is difficult to obtain the necessary services and infrastructure, akin to currently available solutions in the real information from gadgets left at home or in the office. cyber world. Thus, each service being developed in the real Economic factor of effective use of purchased applications world should be placed in the appropriate cloud cell that installed in gadgets and personal computers force users to give combines components similar in functionality and utility. The up their purchase in favor of almost rent free services in the above applies directly to the road service, which has a digital clouds. All of the above represent important arguments and representation in cyberspace on the cloud to offer every driver undeniable evidence of imminent transition from localbased quality conditions of movement, saving time and money. data storage and application use to cloudbased services. The goal of this research is to seek improvements in the quality and safety of traffic through the creation of an Vladimir HAHANOV, Eugenia LITVINOVA, Svetlana ‘intelligent’ road infrastructure, including clouds of traffic CHUMACHENKO, Olesya GUZ, Faculty of Computer Engineering, Kharkov monitoring and quasioptimal motion control in real-time by National University of Radioelectronics, Ukraine (e-mails: {hahanov, kiu, using RFID-passports of vehicles, which allow (1) minimizing ri }@kture.kharkov.ua) Wajeb GHARIBI, College of Computer Science and Information Systems, the time and costs of traffic management and (2) creating Jazan University, Kingdom of Saudi Arabia (e-mail: gharibi@jazanu.edu.sa) innovative scientific and technological solutions to solve social, Ka Lok MAN, Department of Computer Science and Software Engineering, humanitarian, economic and environmental problems of the Xi’an JiaotongLiverpool University, China (e-mail: Ka.Man@xjtlu.edu.cn) INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 20 world. To this end, in this paper we explore technologies and solutions that can help monitor and manage vehicles, with focus on their integration with cloud services based on the use of the existing road infrastructure, RFID, radar and radio navigation. We propose and describe key components needed for an intellectual, cloudbased infrastructure for the monitoring and management of roads and car traffic in real time (see Fig. 2). This infrastructure is intended to improve the quality and safety of vehicle movement and time reduction for traffic movement. II. INNOVATIVE APPEAL AND SYSTEM MODELS The proposed intelligent system (infrastructure, transport, cloud) for monitoring and road management differs from Fig. 3. Structure of vehicle and cloud interaction. The interaction of the real world (car and infrastructure) with a cloud forms two types of relationships defined by the automaton models (see Fig. 4): (1) the transport infrastructure with a cloud for monitoring and management; (2) a car with a cloud for optimization and providing efficiency of movement. Here the following signals are represented by X1, Y1, X2, Y2, C, M. Fig. 2. Mapping of infrastructure and transport in the cloud. existing ones by its structural integration of three related interacting components: (1) an existing mapping services with radiolocation and navigation tools; (2) a novel cloud service for Fig. 4. Interaction of infrastructure, transport and cloud monitoring and road management based on road controllers; and (3) an advanced radio frequency identification tools for The input conditions or operands are necessary to ensure the cars and access to cloud services for comfortable movement on ordered services. The output warning signals confirms the the route, optimization of time and material costs. The novelty execution of service operations, while the input control signals of the system is on the integration with cloud services for form the queries for executing services. The output variables monitoring and management, RFID tags of vehicles, form and identify the state of the management system. monitoring and managing tools of the road infrastructure, all of Automata models of road and car management system are which makes it possible to automate the optimal management represented in the form of variable interaction by the functions of vehicles and traffic in real-time in order to solve social, of transitions and outputs of the automaton of first kind: humanitarian, economic and environmental problems. The automaton model of cloud and vehicles interaction is shown in Fig. 3, where the cars send online their identifiers (personal data), the motion parameters and the current (1) coordinates to the cloud, and in return they receive in real-time services of optimal route (by time, cost, and quality) and motion mode to achieve their final destination. Integrated analysis of road conditions based on processing operational Here, each of the two automata for interacting infrastructure data from vehicles and infrastructure monitors makes it and transport with the cloud has two input variables (services possible to optimally manage road controllers for switching order and state of managed object) and two outputs signals for traffic lights online. monitoring the automaton (cloud) state and management of cloud services. More detailed representation of the interaction among the real, virtual components, and the cloud system for transport monitoring and control is shown in Fig. 5. INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 21 4. For passengers, the benefits are based on providing services to monitor the locations and movement of passenger vehicles on bus stops or transportation terminals through the use of stationary computer display or mobile gadgets to communicate with the corresponding cloud services; visualization on the car screen of critical points of the route for a vehicle in real time through the use of surveillance cameras. The proposed cloud infrastructure will have able to monitor the actual speed for all vehicles and informing the driver about areas of the speed limits; digital monitoring of passage on Fig. 5. Components of an intelligent road infrastructure prohibiting signs and traffic lights. In doing so, it can save fuel, reduce pollution, and decrease travel time by cloud service III. MOTIVATION being able to provide selected best routes. Likewise, it is possible to minimize traffic jams due to preplanning of vehicle There is a strong motivation for this type of research. If we movement. By also taking into account the plans of the other take for example the case of Ukraine, its capitalization of the drivers, we can adjust vehicle routes in real-time or also modify business projects after three years of the exploitation of IRI the switching patterns of traffic lights for better traffic flow cloud is approximately one hundred million USD. In Ukraine, when traffic conditions require it. The system can also help to there are seven million drivers and eight hundred companies. prevent vehicle theft and accidents by detecting patterns of Analogues to the system and approach we propose in this paper driving that are not normal. do not yet exist. There are separate components that are needed to create the infrastructure: electronic maps, satellite location The proposed solutions are synthesized from diverse and navigation systems, specialized databases in clouds, and research areas. The theoretical basis come from research in tools for monitoring, collecting and protecting information. intelligent and brain-like methods and engines for analyzing Some of these element available, but are yet integrated into one cyberspace related to discrete optimization of searching, single infrastructure. Availability of reliable cellular, wireless recognition and decision-making (e.g., see [16]). In addition, communication provides the backbone infrastructure for the some solutions are derived from experiences in the system. Tools for navigating and monitoring vehicles are development and implementation of embedded RFID and financially accessible to drivers. Software, hardware and digital systems for road monitoring is described in (e.g., see network centralized management of traffic across the country, [716, 29, 30]). Likewise, we rely on experiences in the as well as cloud computing technologies are available. The development and implementation of software and cloud technologies used in the infrastructure of roads and cyberspace services for optimizing vehicle routes of Ukrainian are continuously improving, and their cost is reduced. corporations in order to minimize the financial and time costs Computer, mobile and internet literacy of people is enhanced. and improve the quality of passenger service is represented in All these elements lead suggests the feasibility of the (e.g., see 1727]). Finally, we use research from developed infrastructure. distributed road management system in large and major cities is based on highly reliable Siemens computing equipment (e.g., There are many benefits for having such an infrastructure, see [3741]). and these benefits are different for each stakeholder. In the context of our research we have identified the following 4 IV. REQUIREMENTS OF CLOUDBASED ROAD SERVICES stakeholders: “Smart dust” is a set of interconnected autonomous 1. For government agencies (e.g., the police, firemen, public functioning components, which form the microsystem with the buses), the benefits include the exact vehicle transceiver and monitoring tools, and is designed for collecting identification, monitoring the positioning of vehicles in information about the environment state. The main component time and space, including theft; significant reduction of is a unique radiofrequency identification (RFID) tag. This tag is accidents, reducing the impact of road traffic accidents, based on wireless noncontact use of radiofrequency increase of safety and comfort of road users. electromagnetic fields to transfer data, for the purposes of 2. For transport companies, the benefits include monitoring automatically identifying and tracking tags attached to objects. locations and movement of vehicles, quasioptimal The cost of RFID tag is usually less than 1% of the value of the transportation of passengers and cargo for minimizing the object that it uniquely identifies. Its functionality is to maintain material and/or time costs. one-to-one correspondence between the label and object during 3. For drivers, some benefits include providing services the life cycle of a product. associated with generating of quasioptimal routs and The real world is in need of advanced and precise monitoring timetable under the negative factors of the existing and management of cloud. It has long recognized the need for infrastructure in order to minimize the financial and time an absolutely precise radio frequency digital identification of costs in real time. all produce and natural sites on the planet, including humans INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 22 and animals. The next steps are creating cloud virtual digital The value of these tools is low and comparable to the average models of entities (objects) of the real world for accurate amount of fines for traffic violations. The economic benefits of modeling, monitoring and management by all possible relations a cloud, associated with the fuel economy and reduce of travel (natural, social, technical, technological) between them. time, will likely offset costs. There many problems that can be solved by RFID, particularly and more importantly, the identification of a V. CORPORATE TRANSPORTATION MANAGEMENT SYSTEM product (object or subject) in a local or global coordinate Coordinating systems are already being used for optimal system. In addition, it can contain information about the planning routs to deliver goods and reduce time and cost due to: properties of the object and its story of use. For objects that (1) reduced fuel usage because of increased efficient route carry confidential information, such as e-passports and credit planning and better distribution of orders among cars; (2) better cards, it is possible to securely receive and send data to modify forecasting the supply of goods to reduce the storage costs; (3) properties of the object. The RFID will also enable the objects more efficient use of staff time; and (4) improved monitoring to interact with its other objects within its radio visibility and operational management of the vehicles when delivering region. goods in real time. Technically, the object ID is a standalone digital The market appeal of cloud service of transport logistics is system-on-chip with low power transceiver, up to 200 meters, determined by the following potential beneficiary users: and should be able to store information about object, be wholesalers, regional distributors of food and industrial goods modified remotely, store information about all the interactions (bakeries, dairies, meat processing plants, brewing plants, with the surrounding environment, and transmit the interaction industries, transport companies, retailers, logistics service data back to management cloud. providers, freight forwarding companies, vending companies, In short, the advantages of smart dust for transport ambulance, cash services, courier services, online shopping, monitoring infrastructure based on (1) low-power active RFID cleaning companies). In Ukraine alone there are more than transmitter can be in terms of low cost of microsystems, 7,500 of these companies. implemented in car electronics; (2) the use of sufficiently low Transportation of goods is a complex, multifaceted problem cost of transponders for digital spectrum monitoring of road that includes a large number of parameters to determine the infrastructure nodes; (3) the possibility of high accuracy and effectiveness and performance of delivery process. The speed of reading digital information from moving vehicles, transportation problem is NP-complete, where the number of including speed, license plates, data about the driver; (4) the cases is an exponential function of the number of input values. monitoring and prediction of traffic through the analysis of The exact solution can be obtained by complete enumeration of statistical information in the areas of roads and intersections; (5) all possible variants. For real business problems quasi-optimal the possibility of mutual communication by using methods are used, which do not provide the exact solution, and microsystems of vehicles moving towards each other, hence the maximum possible amount of cost savings. It is providing information about the traffic on the road sections of proposed the optimal method for solving the transport problem the route; (6) the ease of detecting stolen vehicles through is based on the algorithms that can significantly reduce the time. global or local monitoring vehicles; (7) the monitoring It becomes acceptable for the analysis of most practical accidents where the exact coordinates of the place and time of situations on maps of the region [28]. the incident can be transmitted speedily; and (8) and feasibility of locking the car engine in case of car theft through the access VI. ORGANIZATION OF THE COMMUNICATIONS BETWEEN code of the owner. “CLOUD – CAR” AND “CLOUD – INFRASTRUCTURE” There are two arguments against the introduction of “cloud” The most important aspect of technological IRI on a national scale. The first is the possible violation of the right implementation is the organization of communications between to privacy, since in theory the cloud provides total monitoring four system components (see Fig. 6), integrated with the cloud. of all vehicles. Today there is a system of lawful interception of We need cloud servers for creating a cloud of long-term storage telecommunications, implemented in accordance with of distributed data and services. In addition, there is need for international requirements. But the interception of telephone buffer computers for collecting data from infrastructure calls of any subscriber is only used during the investigation and monitors and delivering management services to road with the approval of a judicial court. In addition, it is possible to controllers. There we should have CRFID, computer blocks for track the location of the subscriber, which may represent radio frequency identifying vehicles. Finally, we require ICMC, another controversial issue. The second argument deals with infrastructure controllers for traffic monitoring and control the additional costs for the purchase of hardware and software based on radio frequency identification of vehicles. for vehicle authentication and communication with the cloud. INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 23 patrol car. In the United States since the early 1990s, a system 3M GM Automotive Adhesive was used, which can be considered the prototype of the modern RFID technology. The absence of label with a unique number on a vehicle is cause for its detailed review. Research conducted by Moscow University of Technology in 2001, showed that RFID technology can identify stationary objects and moving vehicles with high accuracy and reliability, and also has high reliability, durability and protectability [29]. However, along with the many benefits of this technology there are also disadvantages. First of all, the range of RFID-tags is Fig. 6. The structure of communications between IRI components poor. However, research results of Russian scientists published in Components & Technologies claim to range up to 300 meters. The structure of communication integration of four IRI It is also noted the negative impact of electronic chips on living components is represented by two transactions. The first is and nonliving organisms. Thus, in June 2008 Journal of the (R1*R2) = (SC,BC,CRFID), which is to deliver cloud services American Medical Association published the results of RFID to the customers; while the second is (R1*R3) = impact on medical equipment [30]. Electronic interference (SC,BC,ICMC), which deals with the delivery of control from RFID-tags resets settings of intravenous infusions, signals to the road controllers. The route of the first type uses reprograms the electronic pacemakers and can be the cause of the traditional technologies GPRS, HSPA, WiFi, WiMAX malfunctions of medical equipment. More than a third of tests based on Internet. For the transaction of second any did reveal malfunctions of medical equipment, which was implementation will require the communication to be reliable, located at a distance from centimeters up to six meters from the secure, and protected against unwanted uses. source of RFID. In another third of the tests the serious irregularities of the artificial respirator functioning, infusion It is assumed that the block CRFID will store an individual pumps, devices for hemodialysis, ECG monitors were revealed. vehicle code (CID), the electronic code of residence The negative impact of transponders on living organisms and registration (NID), and the code of the driver (DID), who uses human at times exaggerated in the media and the Internet, the vehicle at the current time. Reading the triad of codes which makes it difficult real introduction of electronic (CNDID) is performed by radio devices, which will be located passports for population. on all the traffic lights, bridges, tunnels, level crossings and other points of the road network, significant from the Any future RFID system will need to consider the standpoint of traffic management, including the critical control abovementioned factors. We can use active RFID tags with two points. The structure of the CRFID unit is shown in Fig. 7, data channels, radio and optical. If the active tag is applied the where the modules (CNDID, CT, SP, ALB, M, D, CU) mean: range is limited primarily by output tag power when fixed ratio universal car code, transceiver, protection module, arithmetic of antenna directional and the sensitivity of the reception and logic unit, memory module, display and control module. channel. RFID system has the ability to adjust the output power of a transmitter when limiting the maximum level by +4 dBm. This excludes any impact on the living and nonliving organisms, because it is on several orders smaller than the norm of allowable SAR (Specific Absorption Rate) specific absorption coefficient of electromagnetic radiation by the human body. SAR is measured by watts per kilogram (W/kg). The Federal Communications Commission in the United States (FCC), Industry Ministry of Canada (IC), as well as the regulatory organizations of some other countries the norm SAR of 1.6 W/kg is accepted. In the European Union a rate of SAR 2 W/kg is accepted. The output power of the proposed RFID does not Fig. 7. Structure of CRFID unit exceed several milliwatt as opposed to mobile phones with Current RFID applications in transportation tell us a positive output power up to two watts. In addition, the RFID module can picture concerning the introduction of such technologies. In be located far away from the driver and passengers, which May 2012 the Ministry of Interior of Russia successfully tested eliminates the negative effect of high-frequency radiation. RFID-tags of license plates in the framework of project “Smart Concerning violations of medical equipment, it should be City”. In this case, the RFID chip was integrated into the license notes that such equipment is missing on the highways, and in plates, produced by JSC “Vanguard”, St. Petersburg. In ambulance cars the medical equipment is located inside the Malaysia, the compulsory setting RFID-chip on the license shielded car. The noise are produced primarily by an intense plates was introduced in 2007. Traffic police can check any car, magnetic field generated by the reader for powering the and even stopping it, from a fixed position or from a mobile transponder (tag), and we can avoid this because the power INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 24 supply of transponders is not from the reader field, but is demodulation; (4) GPS module; (5) Cryptomodule, to encrypt realized by means of the car electrical system or transponder the signals; (6) the Controller, OPcode detect, EEPROM battery. In an extreme case, radio channel of transponder can be control, Mode control are unit management system; (7) the Test switched off and only the optical channel can be used. connector which is switch for unit testing; (8) the Test logic In addition, RFID can be GPS navigation. Modern GPS (Test points), a module for test management and programming; receivers that are based on the chipset SiRF Star III fix the (9) Memory (EEPROM crypto key, ID code), the memory card signal even in the hangars and manufactory shops with for storing data and proprietary information; and (10) MEMS reinforced concrete floor. Receivers of the latest generation sensors. support modern European global positioning system Galileo and Russian system Glonass. The disadvantage of GPS navigation is inability to transfer data about the position of the vehicle to a satellite. Thus, the development of the positioning subsystem IRI can simultaneously realize both of these technologies for their detailed research and application to the task of monitoring and traffic management. VII. STRUCTURE OF CAR UNIT CARID Our proposed concept of CARID is based on the principles used in the air traffic control system ADSB [31,32,33]. The essence of CARID is that the transponder of the vehicle periodically transmits a broadcast message, which includes the identification information and data on the coordinates and speed of the vehicle, receiving from the built-in GPS receiver. In addition, the controller CARID generates protocol of vehicle dynamics, receiving information from the acceleration sensor. As stated earlier, sending a message is realized through two channels, wireless and/or optical. Messages are received by vehicles or fixed stations, which are located in the area of optical or radio coverage. Stationary stations are networked and located in places where there is a power (e.g., light signals). Fig. 8. Structure of CARID unit When receiving a message, CARID checks for it in the “history” and in the absence add it to the memory of controller. When getting into the zone of the stationary monitor (station) VIII. ROAD MANAGEMENT AND MONITORING rewriting all the information accumulated since the previous Modern cities have a complex road infrastructure, where road reading from the memory controller to the memory of the management is carried out through the traffic lights by using station is performed. The information packets are formed and traffic management systems (TMS), which include hundreds of periodically sent to the “cloud”. To ensure high noise tolerance, traffic lights. Here, under the traffic lights we will understand structural stealth of signal and eliminate impact of noise on TMS subsystem that provides monitoring and control of traffic other radio equipment CARID direct spread spectrum DSSS on the separate section of the road network. The central part of are used [34]. The unit can operate in the unlicensed ISM band the subsystem (see Fig. 9) is specialized traffic controllers (TC) with an output of 0 - 4dBm. This is sufficient to ensure the radio with built-in switched power circuits, which are designed to visibility up to 100 meters when using omnidirectional control the traffic lights. Modern TCs, like the German antennas. controllers SITRAFFIC C800 [37], is able to inquire up to 84 All information transmitted via open channels is pre-encoded. vehicle detectors of inductive type and control 48 groups of To eliminate collisions in the block, the method Slotted signals of the total capacity 4 kW in real time with maximum ALOHA is applied [35]. Thus, a distributed intelligent wireless permissible cycle in 300 seconds. C800VX controller supports network based on RFID unit can be created (see Fig. 8), the up to 120 of these modules in management segment, each advantage of which is the presence of distributed storage segment is able to function independently and integrated into devices and rapid information exchange [36]. The structure of TMS network based on wireless technologies (GPRS, CARID unit contains the following modules: (1) Optical WiMAX); it is centrally managed from the traffic control center frontend, which is optical interface; (2) RF frontend, which is (TCC) [38]. RF interface; (2) Synchrogenerator, the frequency generator; (3) the Baseband processor, designed for processing signals after INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 25 Fig. 9. The general structure of traffic light object On present trends of road infrastructure expansion, it is clear Fig. 10. Structure of ICMC unit expanded from Figure 6 that the use of such solutions is possible subject to high reliability of such systems. It is known that if TMS structure is the place of object location; (4) high performance about 10 5 extended (i.e., the number of traffic lights controlled by the instructions per second under a clock cycle time of 15 ns; (5) system is increased) the reliability will decrease [39]. Therefore, high accuracy of cyclic commands; and (6) the use of developing more reliable TMS structures including advanced programming language STEP7 Basic with integrated fuzzy distributed automation technology is topical scientific and logic. industrial problem. Cheaper and much more flexible variant of TMS organization on such principle was proposed in [40], IX. TELEMETRY MODULE “SHERLOCK” where the authors propose to improve the quality of traffic It is designed for creating distributed monitoring and control through distributed automating key processes and creating a systems, including mobile. The module is an electronic device, system of distributed traffic control. They found that to based on three new technologies Mobile-to-Mobile, GPS and improve the reliability of the system along with providing GPRS. The problems solved by the module are mainly related information and control functions of the traffic control center to the vehicle location, in terms of monitoring and tracking. (TCC), TMS should be organized according the principle of centralization-decentralization. In this case, the buffer Module specification is represented below. GPS is a computer of IRI (Fig. 6) executes functions of database server multichannel receiver with high sensitivity and low power and provides connectivity to peripheral workstations, as well as consumption, designed to be used in urban areas and at the it manages multiple TCs, segmented (10 - 20 traffic lights per presence of reflected signals. GSM is three band GSM/GPRS segment) on geographical basis. This TMS architecture allows module that can run in all existing GSM networks in many positioning TCC anywhere in the city and organizing mobile countries, including Ukraine. The module has 8 digital and 1 TCC. In addition, if the central part of the system fails, it will analog inputs, as well as 7 digital outputs (open collector). provide the coordinated functioning to all TCs. All the above CAN 2.0 bus is the interface for connecting to a vehicle problems are solved at low cost for organization, network, managing actuators and inquiring additional sensors. implementation of communication and maintaining acceptable It has 512 KB of internal memory to store telemetric performance, reliability and speed of information transfer. This information. There are also a built-in temperature sensor and control structure is implementation of the component ICMC built-in hardware self-diagnosis for monitoring of (see Fig. 6) and can be represented as a matrix (see Fig. 10), temperatures. elements of which are traffic controllers (RPLC), and the The telemetry module “SHERLOCK” is realized in small columns correspond to the segments of the road network, plastic case; it has one 24pin connector for a power source, controlled by segment servers (RSS), which in turn are actuators and sensors. Two high-frequency SMA connectors controlled by the buffer computer of IRI. are used to connect the GPS and GSM antennas. The telemetry The RSS component is a highly reliable industrial computer. controller for operation in GPRS requires definition of the The component RPLC is based on PLC SIMATIC S71200, access point name (APN, Access Point Name), the name or which is one of the newest controllers from SIEMENS for IPaddress of the server and port number. programming engineering process [41]. The controller S71200 The operation of the module is performed as follows. Any is able to solve the problems of automatic and motion control, attempt to get in touch with GPRS is taken every 10 minutes. and can be used in engineering, enterprise management systems, Data on the change of coordinates taken by GPS receiver is and in other areas. It is multifunctional and has relatively low transferred to the server at intervals of 10 to 90 seconds cost. Compact modular design combined with high computing depending on the speed of the object on which the device is power allows the use of SIMATIC S71200 for a wide range of installed. Remote command control is carried out by using automation problems. The advantages of PLC S71200 are: (1) SMS commands: 1) Request status; 2) Mode configuration for high reliability, the mean time before failure of more than 30 GSM/GPRS; 3) Control outputs; 4) Request to execute USSD years; (2) the ability to dynamically load the software to the commands; 5) Online monitoring service. controller when it is running; (3) service directly performed at INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 26 Access to the online monitoring service is realized around the (3) road infrastructure tools for monitoring and management, clock can be done online. In our case, we have set up one which makes it possible to automate optimal control of (http:gps.rfid.com.ua). To access the service, users have to log transport and traffic in real-time for social, humanitarian, in with a username and password. On service home page a map economic and environmental issues. We believe that if the with location data of mobile objects is shown. Map information components are put together an economically feasible system from company “VISICOM” is used. Control tools involve the can be in place. ability of choosing one, two, or all of the objects owned by the There are many practical values for such a system. For, user, and duration of time for which it is necessary to view example, we can have automated online switching traffic lights information about movement. The status of objects and route to provide free traffic on the route for special machines or for the selected time period, as well as the duration of parking tuples (children, important government officials, ambulance, are represented on the map. Map size and location can be fire department, military convoys, and dangerous goods). We changed by using the mouse and control tools. At the bottom of may also have an optimally assigned online control of traffic the home page there are elements, which allow quickly lights on the roads and intersections with accurate digital switching between the parts of the route and objects, as well as monitoring traffic through the use of RFID-tags of cars, statistical information. If only one object is selected an enabling to minimize the movement time of all road users. additional function for calculating the distance is available. Similarly, it is possible to plan for the best route to achieve one On the Settings page, a user can enter information about or more destinations by a car in time and space, that allows his/her email address, change password, map size and view a reducing time and cost for a given quality of comfort (time of summary of the settings and communication. Objects page is day and year, road surfacing, left turns, weather, traffic jams, designed for changing object name, description and parameters. repairs). Likewise, we can have the history of car movement, Rules for sending messages about object movement are based on car virtual model in cyberspace in the form of an indicated in appropriate menu item. The rules can be changed individual cell of the cloud, which is invariant with respect to on the basis of information about occurrence of an object in the vehicle drivers. It allows tracking any vehicle movement in the area, leaving it, and the transition from one area to another one. past, and to predict the desired routes and future travels without Area control is realized by menu item that allows closing the driver. Finally, service for intelligent managing traffic light areas on the map, which can be used for setting parameters. controller could be realized, so that switch signals are generated Coordinate page shows a summary statistical information about depending on the availability (quantity) of vehicles, which send the location of mobile objects in the current time, as well as the requests from car RFID blocks (CRFIDs). information about the nearest geographical object known to the The cloud online monitoring based on RFID tags that we system. The database stores the information about the propose here will eliminated the need to have license plates. coordinates of several tens of thousands of addresses in Kiev The benefits are numerous. The cloud monitoring will exclude city. the need for the direct intervention of traffic police in cases of Communication page is used to obtain statistical information traffic violations (e.g., speeding, not stopping on red lights). about the system. The last coordinates of mobile objects are This will also help simplifying the process of accident reporting displayed, as well as the following information: the time of as a great deal of information will be available from the tags. It coordinate receiving, telemetry information, and information will make car theft more difficult and hence help to reduce its about the area where every object is located. occurrence, and if it does happen speed up the process of locating the stolen car because its movement is being tracked Telemetry module is distributed with antenna GPS, antenna constantly. In addition, with RFID tags there is no need to have GSM, connecting cable, instruction manual, and SIMcard. plates, and this will help save thousands of tons of material used to produce them. This can potentially ease the registration of X. CONCLUDING REMARKS: PRACTICAL VALUE AND SOCIAL cars. In terms of traffic flow, the system can certainly be able to IMPORTANCE OF PROPOSED CLOUD-BASED MONITORING support better car movement, and with this decrease carbon SYSTEM emission by reducing the idle time at intersections—e.g., It is difficult to forecast social, technological and technical optimal routes can be chosen and traffic lights made to respond positive effects of the revolutionary transformation of the to live conditions. existing world related to implementation cloud road services. In The real world is in need of advanced and precise monitoring 1015 years, we should expect a service for automatically and management of cloud. The problem can be solved only by routing vehicles. However, on the way to full automation some using radio frequency digital identification of all produce and obvious innovative scientific and technological solutions of natural sites on the planet, including humans and animals. The social, humanitarian, economic and environmental problems next steps are creating cloud virtual digital models of entities associated with the emergence of cloud monitoring and (objects) of the real world and all possible relations (natural, management, are represented below. social, technical, technological) between them to create The scientific novelty of our proposed system lies in the services for precise digital modeling, monitoring and system integration of three components: (1) cloud for management of processes and phenomena in the world. monitoring and management, (2) RFID blocks of vehicles, and INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS, VOL. 5, NO. 1, DECEMBER 2014 27 The case of our proposed is strong and we believe that the [20] G. S. Tewolde, “Sensor and network technology for intelligent transportation systems” IEEE International Conference on solutions we proposed in this paper can form the basis for Electro/Information Technology (EIT) 2012 P. 17. creating such a system. We have already started to implement [21] L. Guzzella, “The Automobile of the Future Options for Efficient some of the elements of the cloud system and will be gradually Individual Mobility,” IEEE Control Applications, (CCA) & Intelligent Control, (ISIC). Plenary talk 2009. deploying them in the wild. A complete fully functionally [22] A. Khodayari, A. Ghaffari, M. Nouri, S.Salehinia, and F. Alimardani, system is our long term goal, and we are at a technological “Model Predictive Control system design for carfollowing behavior in stage where this achievable. However, its achievement requires real traffic flow,” IEEE International Conference on Vehicular the coming together of not only researchers and engineers but Electronics and Safety (ICVES) 2012 P. 8792. [23] L. Sunghan, “Road Management System of National Highway ITS,” also companies and government agencies. Fourth International Conference on Computer Sciences and Convergence Information Technology 2009 P. 624626. REFERENCES [24] D. M. Gavrila, “Smart Cars for Safe Driving,” IEEE International Conference on Intelligent Computer Communication and Processing [1] M. F. Bondarenko, V. I. Hahanov, and E. I. Litvinova, “Structure of logic (ICCP). Keynote Lecture 2012. associative multiprocessor”, Automation and Remote Control. 2012. № [25] N. Zingirian, C. Valenti, “Sensor clouds for Intelligent Truck Monitoring,” 10. P. 7192. IEEE Intelligent Vehicles Symposium (IV) 2012 P. 9991004. [2] V. I. Hahanov, E. I. Litvinova, S. V. Chumachenko, О. А. Guz, “Logic [26] L. B. Branisso, E. R. R. Kato, E. C. Pedrino, O. Morandin, and R. H. associative computer”, Electronnoe modelirovanie. 2011. № 1(33). P. Tsunaki, “An Intelligent Autonomous Vehicle Management System,” 7389. Second Brazilian Conference on Critical Embedded Systems (CBSEC) [3] V. Hahanov, G. Wajeb, E. Litvinova, and S. Chumachenko, “Information 2012 P. 4247. analysis infrastructure for diagnosis”, Information an int. interdisciplinary [27] V. V. Brizgalov, V. Chukhantsev, and E. Fedorkin, “Architecture of journal. 2011. Japan. Vol.14. № 7. Р. 24192433. traffic control systems using cloud computing” International Conference [4] V. I. Hahanov, and E. I. Litvinova, “Multiprocessor for analysis of and Seminar on Micro/Nanotechnologies and Electron Devices (EDM) information space. 1. Architecture of logic associative multiprocessor” 2010 P. 215216. TOMSK STATE UNIVERSITY BULLETIN. No1. 2011. P. 95108. [28] D. V. Shakhov, “Problem P=NP/ Official” Website of Novako Co. [5] V. I. Hahanov, and S. V. Chumachenko, “Multiprocessor for analysis of http:novako.ucoz.ru/files/pvsnp/P_eq_NP_publication.pdf information space. 2 Infrastructure for vector logic analysis”, Вестник [29] S. Dudnikov, and I. Boenko, “Contactless identification of transport Томского государственного университета. No2. 2011. P. 108116. based on RFID,” Components and technologies. No1 2007 [6] V. I. Hahanov, A. А. Murad, E. I. Litvinova, О. А. Guz, and I. V. http:www.kite.ru/assets/files/pdf/2007_01_140.pdf Hahanova, “Quantum models for computing processes” Radioelectronics [30] Remko van der Togt, “Electromagnetic Interference From Radio & Informatics. 2011. No 3. P.3540. Frequency Identification Inducing Potentially Hazardous Incidents in [7] X. M. Chen, and Z. H. Wei, “Vehicle management system based on Critical Care Medical Equipment,” Journal of the american medical multinode RFID cards”, 30th Chinese Control Conference (CCC) 2011 P. association June 25, 2008, Vol 299, No. 24. 54975499. http:jama.jamanetwork.com/article.aspx?articleid=182113 [8] L. Y. Jiang, S. Wang, H. Zhang, and H. Q. Tan. “Improved Design of [31] Aeronautical Telecommunications Surveillance Radar and Collision Vehicle Management System Based on RFID”, International Conference Avoidance Systems, International Civil Aviation Organization, 2002, on Intelligent System Design and Engineering Application (ISDEA), 213p. 2010 Vol. 1 P. 844847. [32] Surveillance Transition Scenario for German Airspace. Results of the [9] P. Manikonda, A. K. Yerrapragada, and S. S. Annasamudram, “Intelligent DFS ADSB Study Group. DFS Deutsche Flugsicherung GmbH. Heribert traffic management system”, IEEE Conference on Sustainable Utilization Lafferton, Dr.Roland Mallwitz. January 31, 2007. and Development in Engineering and Technology (STUDENT) 2011 P. [33] RTCA Special Committee 186, Working Group 3, ADSB 1090 MOPS, 119122. Revision B, Meeting #30, 1090WP3012, August 1821, 2009, 47p. [10] A.T Lu, Y. S. Li, Y. F. Sun, C. Z. Cao, K. G. Gao, and J. Xu, “Research on [34] V. Ipatov, “Spread Spectrum and CDMA Principles and Applications,” the Integrated Management of Highway Based on Radio Frequency Valery P. Ipatov /, John Wiley & Sons Ltd, The Atrium, Southern Gate, Identification Technology”, Third International Conference on Chichester, West Sussex PO19 8SQ, England, 2005, 383p. Measuring Technology and Mechatronics Automation (ICMTMA) 2011 [35] K. Finkenzeller, RFID Handbuch, K. Finkenzeller, John Wiley & Sons Vol.3 P. 116119. Ltd. The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, [11] E. Z. Zhang, W. L. Jiang, Y. J. Kuang, and M. A. Umer, “Active RFID United Kingdom, 2010, 480p. positioning of vehicles in road traffic”, 11th International Symposium on [36] S. L. Wu, “Wireless ad hoc networking” ShihLin Wu, YuChee Tseng /, Communications and Information Technologies (ISCIT) 2011 P. 222227. Auerbach Publications, Taylor & Francis Group, 6000 Broken Sound [12] A. A. Pandit, J. Talreja, and A. K. Mundra, “RFID Tracking System for Parkway NW, Suite 300, Boca Raton, FL 33487 2742, 2007, 660p. Vehicles (RTSV)”, First International Conference on Computational [37] Verkehrssteuergeräte SITRAFFIC C900/C800: Erfolgreiche Referenzen Intelligence, Communication Systems and Networks 2009 P.160165. auf drei Kontinenten / Siemens AG, München, 2007 Die Quelle der [13] S. Preradovic, and N. Karmakar, “Chipless RFID for intelligent traffic Daten: information system”, IEEE International Symposium on Antennas and http:transportation.siemens.com/shared/data/pdf/www/infrastructure_log Propagation (APSURSI) 2011P. 992995. istics/verkehrssteuerger_e4te_20sitraffic_20c900c800.pdf [14] F. Esker, “RFID in Vehicles” NetWorld Alliance LLC 2012 3 p. [38] I. P. Englesy, A. N. Poletaykin, “German experience in road organization [15] B. Fung, K. AlHussaeni, and M. Cao, “Preserving RFID data privacy” and safety in cities” Bulletin of the Donetsk Academy of road transport. IEEE International Conference on RFID 2009 P. 200207. Donetsk. 2012. No3. P. 49–57. [16] S. F. Hallowell, and P. Z. Jankowski, “Transportation security [39] V. V. Denisenko, “Computer control of process, experiment, and technologies research and development”, IEEE Military Communications equipment.” М.: "Goryachaya liniyaTelecom". 2009. 258 p. Conference 2005 Vol. 3 P. 17531756. [40] Y. V. Belov, О. А. Guz, and A. N. Poletaykin, “Threelayer architecture of [17] T. Oka, S. Inoue, and Y. Kakuda, “An adaptive automobile control distributed automation traffic control system,” Proceeding of system using scheduling by imprecise computation and multiagentbased International Conference “Ensuring the safety and comfort of road: traffic information exchange and its experimental evaluation,” 24th problems and solutions” /. Kharkov: KhNURE, KhNAHU. 2011. P. 123 – International Conference on Distributed Computing Systems Workshops 126. 2004 P. 610. – 615. [41] О. А. Guz, A. N. Poletaykin, and А. А. Dunayev, “Distributed control of [18] T. Samad, “Perspectives in Control Engineering Technologies, traffic lights based on controllers simatics 71200,” Proceeding of Applications, and New Directions.” Intelligent Transportation Systems: International Conference “Logistics of industrial regions”. Donetsk – Roadway Applications Wiley IEEE Press 2001 P. 348 369. Svyatogorsk. 2011. P. 454 – 457. [19] J. Schutte, “Recent trends in automatic train controls” IEEE Intelligent Transportation Systems 2001 P. 813 819. INTERNATIONAL JOURNAL OF DESIGN, ANALYSIS AND TOOLS FOR INTEGRATED CIRCUITS AND SYSTEMS The International Journal of Design, Analysis and Tools for Integrated Circuits and Systems (IJDATICS) was created by a network of researchers and engineers both from academia and industry. IJDATICS is an international journal intended for professionals and researchers in all fields of design, analysis and tools for integrated circuits and systems. The objective of the IJDATICS is to serve a better understanding between the community of researchers and practitioners both from academia and industry. Editor-In-Chief Ka Lok Man Xi'an Jiaotong-Liverpool University, China, Baltic Institute of Advanced Technology, Lithuania Co-Editor-In-Chief Chi-Un Lei University of Hong Kong, Hong Kong Amir-Mohammad Rahmani University of Turku, Finland Managing Editor Michele Mercaldi, Kaiyu Wan, Tomas Krilavičius, EnvEve, Switzerland Xi'an Jiaotong-Liverpool University, China Baltic Institute of Advanced Technologies, Lithuania Vytautas Magnus University, Lithuania Journal Secretary Publishing Manager Jun Wang, Nan Zhang, Fujitsu Laboratories of America, Inc., USA Xi'an Jiaotong-Liverpool University, China Linguistic Editor Nigel Julian Dixon, Caren Crowley, Xi'an Jiaotong-Liverpool University, China Katholieke Universiteit Leuven, Belgium Associate Editor Chao Lu Hai-Ning Liang Mou Ling Dennis Wong Arctic Sand Technologies Inc. Cambridge, MA, US Xi'an Jiaotong-Liverpool University, China Swinburne University of Technology, Malaysia Editorial Board Vladimir Hahanov, Kharkov National University of Franck Vedrine, CEA LIST, France Cheng C. Liu, University of Wisconsin at Stout, USA Radio Electronics, Ukraine Bruno Monsuez, ENSTA, France Farhan Siddiqui, Walden University, Minneapolis, Paolo Prinetto, Politecnico di Torino, Italy Kang Yen, Florida International University, USA USA Massimo Poncino, Politecnico di Torino, Italy Takenobu Matsuura, Tokai University, Japan Katsumi Wasaki, Shinshu University, Japan Alberto Macii, Politecnico di Torino, Italy R. Timothy Edwards, MultiGiG, Inc., USA Pankaj Gupta, Microsoft Corporation, USA Joongho Choi, University of Seoul, South Korea Olga Tveretina, Karlsruhe University, Germany Masoud Daneshtalab, University of Turku, Finland Wei Li, Fudan University, China Maria Helena Fino, Universidade Nova De Lisboa, Amit Chaudhry, Technology Panjab University, India Michel Schellekens, University College Cork, Ireland Portugal Bharat Bhushan Agarwal, I.F.T.M., University, India Emanuel Popovici, University College Cork, Ireland Adrian Patrick ORiordan, University College Cork, Abhilash Goyal, Oracle (SunMicrosystems), USA Jong-Kug Seon, System LSI Lab., LS Industrial Ireland Boguslaw Cyganek, AGH University of Science and Systems R&D Center, South Korea Grzegorz Labiak, University of Zielona Gora, Poland Technology, Poland Umberto Rossi, STMicroelectronics, Italy Jian Chang, Texas Instruments, Inc, USA Yeo Kiat Seng, Nanyang Technological University, Franco Fummi, University of Verona, Italy Yeh-Ching Chung, National Tsing-Hua University, Singapore Graziano Pravadelli, University of Verona, Italy Taiwan Youngmin Kim, UNIST Academy-Industry Research Yui Fai Lam, Hong Kong University of Science and Anna Derezinska, Warsaw University of Technology, Corporation, South Korea Technology, Hong Kong Poland Tom English, Xlinx, Ireland Ajay Patel, Intelligent Support Ltd, United Kingdom Kyoung-Rok Cho, Chungbuk National University, Nicolas Vallee, RATP, France Jinfeng Huang, Philips & LiteOn Digital Solutions South Korea Rajeev Narayanan, Cadence Design Systems, Austin, Netherlands, The Netherlands Yuanyuan Zeng, Wuhan university, China TX, USA Thierry Vallee, Georgia Southern University, D.P. Vasudevan, University College Cork, Ireland Xuan Guan, Freescale Semiconductor, Austin, TX, Statesboro, Georgia, USA Arkadiusz Bukowiec, University of Zielona Gora, USA Monica Donno, Minteos, Italy Poland Pradip Kumar Sadhu, Indian School of Mines, India Jun-Dong Cho, Sung Kyun Kwan University, South Maziar Goudarzi, Sharif University of Technology, Fei Qiao, Tsinghua University, China Korea Iran Ding-Yuan Cheng, National Chiao Tung University, AHM Zahirul Alam, International Islamic University Jin Song Dong, National University of Singapore, Taiwan Malaysia, Malaysia Singapore Shin-Il Lim, Seokyeong University, Seoul Korea Gregory Provan, University College Cork, Ireland Dhamin Al-Khalili, Royal Military College of Canada, Pradeep Sharma, IEC College of Engineering & Miroslav N. Velev, Aries Design Automation, USA Canada Technology, Greater M. Nasir Uddin, Lakehead University, Canada Zainalabedin Navabi, University of Tehran, Iran Noida, GB Nagar UP, India Dragan Bosnacki, Eindhoven University of Lyudmila Zinchenko, Bauman Moscow State Ausra Vidugiriene, Vytautas Magnus University, Technology, The Netherlands Technical University, Russia Lithuania Milan Pastrnak, Siemens IT Solutions and Services, Muhammad Almas Anjum, National University of Sheung-Hung Poon, National Tsing Hua University, Slovakia Sciences and Technology (NUST), Pakistan Taiwan John Herbert, University College Cork, Ireland Deepak Laxmi Narasimha, University of Malaya, Lixin Cheng, Suzhou Institute of Nano-Tech and Zhe-Ming Lu, Sun Yat-Sen University, China Malaysia Nano-Bionics (SINANO), Jeng-Shyang Pan, National Kaohsiung University of Danny Hughes, Katholieke Universiteit Leuven, Chinese Academy of Sciences, China Applied Sciences, Taiwan Belgium Yue Yang, Suzhou Institute of Nano-Tech and Nano- Chin-Chen Chang, Feng Chia University, Taiwan A.P. Sathish Kumar, PSG Institute of Advanced Bionics (SINANO), Studies, India Chinese Academy of Sciences, China Mong-Fong Horng, Shu-Te University, Taiwan N. Jaisankar, VIT University. India Yo-Sub Han, Yonsei University, South Korea Liang Chen, University of Northern British Columbia, Canada Atif Mansoor, National University of Sciences and Chien-Chang Chen, Tamkang University, Taiwan Technology (NUST), Pakistan Hui-huang Hsu, Tamkang University, Taiwan Chee-Peng Lim, University of Science Malaysia, Steven Hollands, Synopsys, Ireland Malaysia Siamak Mohammadi, University of Tehran, Iran Hwann-Tzong Chen, National Tsing Hua University, Salah Merniz, Mentouri University, Constantine, Felipe Klein, State University of Campinas Taiwan Algeria (UNICAMP), Brazil Wichian Sittiprapaporn, Mahasarakham University, Oscar Valero, University of Balearic Islands, Spain Enggee Lim, Xi'an Jiaotong-Liverpool University, Thailand Yang Yi, Sun Yat-Sen University, China China Aseem Gupta, Freescale Semiconductor Inc., Austin, Damien Woods, University of Seville, Spain Kevin Lee, Murdoch University, Australia TX, USA Matthieu Moy, Verimag Laboratory, France Prabhat Mahanti, University of New Brunswick, Saint Kevin Marquet, Verimag Laboratory, France Ramy Iskander, LIP6 Laboratory, France John, Canada Brian Logan, University of Nottingham, UK Suryaprasad Jayadevappa, PES School of Engineering, Tammam Tillo, Xi'an Jiaotong-Liverpool University, Asoke Nath, St. Xavier's College (Autonomous), India India China Tharwon Arunuphaptrairong, Chulalongkorn Shanmugasundaram Hariharan, Pavendar Wen Chang Huang, Kun Shan University, Taiwan University, Thailand Bharathidasan College of Engineering and Masahiro Sasaki, The University of Tokyo, Japan Shin-Ya Takahasi, Fukuoka University, Japan Technology, India Shishir K. Shandilya, NRI Institute of Information Shiho Kim, Chungbuk National University, Korea Chung-Ho Chen, National Cheng-Kung University, Science & Technology, India Hi Seok Kim, Cheongju University, Korea Taiwan J.P.M. Voeten, Eindhoven University of Technology, Yanyan Wu, Xi'an Jiaotong-Liverpool University, Kyung Ki Kim, Daegu University, Korea The Netherlands China
Enter the password to open this PDF file:
-
-
-
-
-
-
-
-
-
-
-
-