You are on page 1of 54

Intelligent Computing and Information

and Communication: Proceedings of


2nd International Conference, ICICC
2017 1st Edition Subhash Bhalla
Visit to download the full and correct content document:
https://textbookfull.com/product/intelligent-computing-and-information-and-communic
ation-proceedings-of-2nd-international-conference-icicc-2017-1st-edition-subhash-bh
alla/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

International Conference on Innovative Computing and


Communications Proceedings of ICICC 2020 Volume 2
Deepak Gupta

https://textbookfull.com/product/international-conference-on-
innovative-computing-and-communications-proceedings-of-
icicc-2020-volume-2-deepak-gupta/

International Conference on Innovative Computing and


Communications Proceedings of ICICC 2020 Volume 1
Deepak Gupta

https://textbookfull.com/product/international-conference-on-
innovative-computing-and-communications-proceedings-of-
icicc-2020-volume-1-deepak-gupta/

Smart Computing and Communication Second International


Conference SmartCom 2017 Shenzhen China December 10 12
2017 Proceedings 1st Edition Meikang Qiu

https://textbookfull.com/product/smart-computing-and-
communication-second-international-conference-
smartcom-2017-shenzhen-china-december-10-12-2017-proceedings-1st-
edition-meikang-qiu/

Information and Communication Technology for


Competitive Strategies Proceedings of Third
International Conference on ICTCS 2017 Simon Fong

https://textbookfull.com/product/information-and-communication-
technology-for-competitive-strategies-proceedings-of-third-
international-conference-on-ictcs-2017-simon-fong/
Proceedings of First International Conference on
Information and Communication Technology for
Intelligent Systems Volume 2 1st Edition Suresh Chandra
Satapathy
https://textbookfull.com/product/proceedings-of-first-
international-conference-on-information-and-communication-
technology-for-intelligent-systems-volume-2-1st-edition-suresh-
chandra-satapathy/

Proceedings of the 2nd International Conference on Data


Engineering and Communication Technology ICDECT 2017
Anand J. Kulkarni

https://textbookfull.com/product/proceedings-of-the-2nd-
international-conference-on-data-engineering-and-communication-
technology-icdect-2017-anand-j-kulkarni/

Recent Advances in Information and Communication


Technology 2019: Proceedings of the 15th International
Conference on Computing and Information Technology
(IC2IT 2019) Pongsarun Boonyopakorn
https://textbookfull.com/product/recent-advances-in-information-
and-communication-technology-2019-proceedings-of-the-15th-
international-conference-on-computing-and-information-technology-
ic2it-2019-pongsarun-boonyopakorn/

Intelligent Computing Theories and Application 13th


International Conference ICIC 2017 Liverpool UK August
7 10 2017 Proceedings Part I 1st Edition De-Shuang
Huang
https://textbookfull.com/product/intelligent-computing-theories-
and-application-13th-international-conference-
icic-2017-liverpool-uk-august-7-10-2017-proceedings-part-i-1st-
edition-de-shuang-huang/

Communication and Computing Systems-Proceedings of the


2nd International Conference on Communication and
Computing Systems (ICCCS 2018), December 1-2, 2018,
Gurgaon, India 1st Edition B.M.K. Prasad (Editor)
https://textbookfull.com/product/communication-and-computing-
systems-proceedings-of-the-2nd-international-conference-on-
communication-and-computing-systems-
Advances in Intelligent Systems and Computing 673
Subhash Bhalla
Vikrant Bhateja
Anjali A. Chandavale
Anil S. Hiwale
Suresh Chandra Satapathy Editors

Intelligent
Computing and
Information and
Communication
Proceedings of 2nd International
Conference, ICICC 2017
Advances in Intelligent Systems and Computing

Volume 673

Series editor
Janusz Kacprzyk, Polish Academy of Sciences, Warsaw, Poland
e-mail: kacprzyk@ibspan.waw.pl
The series “Advances in Intelligent Systems and Computing” contains publications on
theory, applications, and design methods of Intelligent Systems and Intelligent Computing.
Virtually all disciplines such as engineering, natural sciences, computer and information
science, ICT, economics, business, e-commerce, environment, healthcare, life science are
covered. The list of topics spans all the areas of modern intelligent systems and computing.
The publications within “Advances in Intelligent Systems and Computing” are primarily
textbooks and proceedings of important conferences, symposia and congresses. They cover
significant recent developments in the field, both of a foundational and applicable character.
An important characteristic feature of the series is the short publication time and world-wide
distribution. This permits a rapid and broad dissemination of research results.
Advisory Board
Chairman
Nikhil R. Pal, Indian Statistical Institute, Kolkata, India
e-mail: nikhil@isical.ac.in
Members
Rafael Bello Perez, Universidad Central “Marta Abreu” de Las Villas, Santa Clara, Cuba
e-mail: rbellop@uclv.edu.cu
Emilio S. Corchado, University of Salamanca, Salamanca, Spain
e-mail: escorchado@usal.es
Hani Hagras, University of Essex, Colchester, UK
e-mail: hani@essex.ac.uk
László T. Kóczy, Széchenyi István University, Győr, Hungary
e-mail: koczy@sze.hu
Vladik Kreinovich, University of Texas at El Paso, El Paso, USA
e-mail: vladik@utep.edu
Chin-Teng Lin, National Chiao Tung University, Hsinchu, Taiwan
e-mail: ctlin@mail.nctu.edu.tw
Jie Lu, University of Technology, Sydney, Australia
e-mail: Jie.Lu@uts.edu.au
Patricia Melin, Tijuana Institute of Technology, Tijuana, Mexico
e-mail: epmelin@hafsamx.org
Nadia Nedjah, State University of Rio de Janeiro, Rio de Janeiro, Brazil
e-mail: nadia@eng.uerj.br
Ngoc Thanh Nguyen, Wroclaw University of Technology, Wroclaw, Poland
e-mail: Ngoc-Thanh.Nguyen@pwr.edu.pl
Jun Wang, The Chinese University of Hong Kong, Shatin, Hong Kong
e-mail: jwang@mae.cuhk.edu.hk

More information about this series at http://www.springer.com/series/11156


Subhash Bhalla Vikrant Bhateja

Anjali A. Chandavale Anil S. Hiwale


Suresh Chandra Satapathy


Editors

Intelligent Computing
and Information
and Communication
Proceedings of 2nd International Conference,
ICICC 2017

123
Editors
Subhash Bhalla Anil S. Hiwale
Department of Computer Software Department of Information Technology
University of Aizu MIT College of Engineering
Aizuwakamatsu, Fukushima Pune, Maharashtra
Japan India

Vikrant Bhateja Suresh Chandra Satapathy


Department of Electronics and Department of Computer Science
Communication Engineering and Engineering
Shri Ramswaroop Memorial Group of Anil Neerukonda Institute
Professional Colleges of Technology and Sciences
Lucknow, Uttar Pradesh Visakhapatnam, Andhra Pradesh
India India

Anjali A. Chandavale
Department of Information Technology
MIT College of Engineering
Pune, Maharashtra
India

ISSN 2194-5357 ISSN 2194-5365 (electronic)


Advances in Intelligent Systems and Computing
ISBN 978-981-10-7244-4 ISBN 978-981-10-7245-1 (eBook)
https://doi.org/10.1007/978-981-10-7245-1
Library of Congress Control Number: 2017959316

© Springer Nature Singapore Pte Ltd. 2018


This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part
of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations,
recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission
or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar
methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this
publication does not imply, even in the absence of a specific statement, that such names are exempt from
the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this
book are believed to be true and accurate at the date of publication. Neither the publisher nor the
authors or the editors give a warranty, express or implied, with respect to the material contained herein or
for any errors or omissions that may have been made. The publisher remains neutral with regard to
jurisdictional claims in published maps and institutional affiliations.

Printed on acid-free paper

This Springer imprint is published by Springer Nature


The registered company is Springer Nature Singapore Pte Ltd.
The registered company address is: 152 Beach Road, #21-01/04 Gateway East, Singapore 189721, Singapore
Preface

The second International Conference on Intelligent Computing and Communication


(ICICC 2017) was successfully organized by Dr. Vishwanath Karad, MIT World
Peace University, Pune, during August 2–4, 2017, at MIT College of Engineering,
Pune, India. The conference had technical collaboration with Computer Society of
India and College of Engineering Pune and was supported by All India Council for
Technical Education (AICTE) and Council of Scientific and Industrial Research
(CSIR). The objective of this international conference was to provide a platform for
academicians, researchers, scientists, professionals, and students to share their
knowledge and expertise in the field of intelligent computing, communication, and
convergence and address various issues to increase awareness of technological
innovations and to identify challenges and opportunities for the development of
smart cities using multidisciplinary research techniques. Research submissions in
various advanced technology areas were received, and after a rigorous peer-review
process with the help of program committee members and external reviewers, only
quality papers were accepted. The conference featured eight special sessions on
various cutting-edge technologies which were conducted by eminent professors and
many distinguished academicians like Dr. Vijay Bhatkar, Padma Bhushan,
Chancellor of Nalanda University, Bihar, India; Dr. Hemant Darbari, Executive
Director, CDAC, Pune, India; Dr. Bipin Indurkhya, Jagiellonian University,
Kraków, Poland; and Dr. Subhash Bhalla, University of Aizu, Japan.
Our sincere thanks to all special session chairs Prof. Dr. Priti Rege,
Prof. Dr. R. A. Patil, Dr. Anagha Kulkarni and distinguished reviewers for their
timely technical support. We would like to extend our special thanks here to our

v
vi Preface

publication chairs for doing a great job in making the conference widely visible.
Thanks to dynamic team members for organizing the event in a smooth manner.
Our sincere thanks to all sponsors, press, print, and electronic media for their
excellent coverage of this conference.

Aizuwakamatsu, Japan Subhash Bhalla


Lucknow, India Vikrant Bhateja
Pune, India Anjali A. Chandavale
Pune, India Anil S. Hiwale
Visakhapatnam, India Suresh Chandra Satapathy
Organizing Committee

Chief Patrons
Prof. Dr. Vishwanath Karad, India
Prof. Dr. Vijay Bhatkar, India
Patrons
Prof. Dr. Mangesh Karad, India
Prof. Dr. Rahul Karad, India
Organizing Chair
Dr. Ramchandra Pujeri, India
Organizing Co-chair
Dr. Anil Hiwale, India
Advisory Committee
Dr. Seeram Ramakrishna, Singapore
Dr. Subhash Bhalla, Japan
Dr. Shirish Sane, India
Dr. Suresh Borkar, USA
Dr. Shabnam Ivkovic, Canada
TPC Chair
Dr. Anjali A. Chandavale, India
Publication Chair
Dr. Suresh Chandra Satapathy, Vijayawada, India

vii
Contents

35 W GaN Solid-State Driver Power Amplifier for L-Band Radar


Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Vivek Ratnaparkhi and Anil Hiwale
Validation of Open Core Protocol by Exploiting Design Framework
Using System Verilog and UVM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Gopika Rani Alekhya Pamarthy, M. Durga Prakash
and Avinash Yadlapati
Cellular Automata Logic Block Observer Based Testing for
Network-on-Chip Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Shaik Mohammed Waseem and Afroz Fatima
Structural Strength Recognizing System with Efficient Clustering
Technique . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Sumedha Sirsikar and Manoj Chandak
Trajectory Outlier Detection for Traffic Events: A Survey . . . . . . . . . . . 37
Kiran Bhowmick and Meera Narvekar
A Privacy-Preserving Approach to Secure Location-Based Data . . . . . . 47
Jyoti Rao, Rasika Pattewar and Rajul Chhallani
Analysis of Blind Image Watermarking Algorithms . . . . . . . . . . . . . . . . 57
Chhaya S. Gosavi and Suresh N. Mali
ClustMap: A Topology-Aware MPI Process Placement Algorithm for
Multi-core Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
K. B. Manwade and D. B. Kulkarni
Mobile Agent-Based Frequent Pattern Mining for Distributed
Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Yashaswini Joshi, Shashikumar G. Totad, R. B. Geeta
and P. V. G. D. Prasad Reddy

ix
x Contents

A Hybrid Approach for Preprocessing of Imbalanced Data in Credit


Scoring Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Uma R. Salunkhe and Suresh N. Mali
Vision-Based Target Tracking Intelligent Robot Using NI myRIO with
LabVIEW . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Anita Gade and Yogesh Angal
Detection of Misbehaviors Nodes in Wireless Network with Help of
Pool Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Asha Chaudhary and Pournima More
Evaluation of Multi-label Classifiers in Various Domains Using
Decision Tree . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
V. S. Tidake and S. S. Sane
An Effective Multilabel Classification Using Feature Selection . . . . . . . . 129
S. S. Sane, Prajakta Chaudhari and V. S. Tidake
High-Performance Pipelined FFT Processor Based on Radix-22 for
OFDM Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
Manish Bansal and Sangeeta Nakhate
An Image Processing Approach to Blood Spatter Source
Reconstruction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
Abhijit Shinde, Ashish Shinde and Deepali Sale
Overlapping Character Recognition for Handwritten Text Using
Discriminant Hidden Semi-Markov Model . . . . . . . . . . . . . . . . . . . . . . . 163
Ashish Shinde and Abhijit Shinde
A Literature Survey on Authentication Using Behavioural Biometric
Techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
Rajvardhan Oak
Number System Oriented Text Steganography in English Language
for Short Messages: A Decimal Approach . . . . . . . . . . . . . . . . . . . . . . . 183
Kunal Kumar Mandal, Santanu Koley and Saptarshi Mondal
Novel Robust Design for Reversible Code Converters and Binary
Incrementer with Quantum-Dot Cellular Automata . . . . . . . . . . . . . . . . 195
Bandan Kumar Bhoi, Neeraj Kumar Misra and Manoranjan Pradhan
Routing with Secure Alternate Path Selection for Limiting the Sink
Relocation and Enhanced Network Lifetime . . . . . . . . . . . . . . . . . . . . . 207
Renuka Suryawanshi, Kajal Kapoor and Aboli Patil
Contents xi

Gene Presence and Absence in Genomic Big Data for Precision


Medicine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
Mohamood Adhil, Mahima Agarwal, Krittika Ghosh, Manas Sule
and Asoke K. Talukder
A Survey on Service Discovery Mechanism . . . . . . . . . . . . . . . . . . . . . . 227
Gitanjali Shinde and Henning Olesen
Analysis of Multiple Features and Classifier Techniques Combination
for Image Pattern Recognition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
Ashish Shinde and Abhijit Shinde
Smart and Precision Polyhouse Farming Using Visible Light
Communication and Internet of Things . . . . . . . . . . . . . . . . . . . . . . . . . 247
Krishna Kadam, G. T. Chavan, Umesh Chavan, Rohan Shah
and Pawan Kumar
Acceleration of CNN-Based Facial Emotion Detection Using NVIDIA
GPU . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
Bhakti Sonawane and Priyanka Sharma
Research Issues for Energy-Efficient Cloud Computing . . . . . . . . . . . . . 265
Nitin S. More and Rajesh B. Ingle
Implementation of REST API Automation for Interaction Center . . . . . 273
Prajakta S. Marale and Anjali A. Chandavale
Predictive Analysis of E-Commerce Products . . . . . . . . . . . . . . . . . . . . . 279
Jagatjyoti G. Tuladhar, Ashish Gupta, Sachit Shrestha, Ujjen Man Bania
and K. Bhargavi
User Privacy and Empowerment: Trends, Challenges, and
Opportunities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 291
Prashant S. Dhotre, Henning Olesen and Samant Khajuria
Evolution Metrics for a BPEL Process . . . . . . . . . . . . . . . . . . . . . . . . . . 305
N. Parimala and Rachna Kohar
Development of Performance Testing Suite Using Apache JMeter . . . . . 317
Jidnyasa Agnihotri and Rashmi Phalnikar
Characterizing Network Flows for Detecting DNS, NTP, and SNMP
Anomalies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
Rohini Sharma, Ajay Guleria and R. K. Singla
Periocular Region Based Biometric Identification Using the Local
Descriptors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
K. Kishore Kumar and P. Trinatha Rao
xii Contents

Model-Based Design Approach for Software Verification Using


Hardware-in-Loop Simulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353
Pranoti Joshi and N. B. Chopade
Silhouette-Based Human Action Recognition by Embedding HOG and
PCA Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 363
A. S. Jahagirdar and M. S. Nagmode
Unified Algorithm for Melodic Music Similarity and Retrieval in
Query by Humming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
Velankar Makarand and Kulkarni Parag
Predict Stock Market Behavior: Role of Machine Learning
Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383
Uma Gurav and Nandini Sidnal
Stability of Local Information-Based Centrality Measurements Under
Degree Preserving Randomizations . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395
Chandni Saxena, M. N. Doja and Tanvir Ahmad
Hybrid Solution for E-Toll Payment . . . . . . . . . . . . . . . . . . . . . . . . . . . 405
Ajinkya R. Algonda, Rewati R. Sonar and Saranga N. Bhutada
Enhancing Distributed Three Hop Routing Protocol in Hybrid
Wireless Network Through Data Weight-Based Scheme . . . . . . . . . . . . 415
Neha S. Rathod and Poonam Gupta
VLSI-Based Data Hiding with Transform Domain Module Using
FPGA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425
Latika R. Desai and Suresh N. Mali
A Novel Approach of Frequent Itemset Mining Using HDFS
Framework . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435
Prajakta G. Kulkarni and S. R. Khonde
Issues of Cryptographic Performance in Resource-Constrained
Devices: An Experimental Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 447
Balaso Jagdale and Jagdish Bakal
Assessment of Object Detection Using Deep Convolutional Neural
Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457
Ajeet Ram Pathak, Manjusha Pandey, Siddharth Rautaray
and Karishma Pawar
Contents xiii

Implementation of Credit Card Fraud Detection System with Concept


Drifts Adaptation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467
Anita Jog and Anjali A. Chandavale
Intelligent Traffic Control by Multi-agent Cooperative Q Learning
(MCQL) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479
Deepak A. Vidhate and Parag Kulkarni
Digital Tokens: A Scheme for Enabling Trust Between Customers and
Electronic Marketplaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491
Balaji Rajendran, Mohammed Misbahuddin, S. Kaviraj
and B. S. Bindhumadhava
BMWA: A Novel Model for Behavior Mapping for Wormhole
Adversary Node in MANET . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505
S. B. Geetha and Venkanagouda C. Patil
AWGN Suppression Algorithm in EMG Signals Using Ensemble
Empirical Mode Decomposition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 515
Ashita Srivastava, Vikrant Bhateja, Deepak Kumar Tiwari
and Deeksha Anand
Visible-Infrared Image Fusion Method Using
Anisotropic Diffusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 525
Ashutosh Singhal, Vikrant Bhateja, Anil Singh
and Suresh Chandra Satapathy
Fast Radial Harmonic Moments for Invariant Image
Representation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 533
Shabana Urooj, Satya P. Singh, Shevet Kamal Maurya
and Mayank Priyadarshi
A Wide-Area Network Protection Method Using PMUs . . . . . . . . . . . . . 539
Namita Chandra and Shabana Urooj
Analysis and Prediction of the Effect of Surya Namaskar on Pulse of
Different Prakruti Using Machine Learning . . . . . . . . . . . . . . . . . . . . . . 547
Jayshree Ghorpade-Aher, Abhishek Girish Patil, Eeshan Phatak,
Sumant Gaopande and Yudhishthir Deshpande
Cognitive Depression Detection Methodology Using EEG Signal
Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 557
Sharwin P. Bobde, Shamla T. Mantri, Dipti D. Patil and Vijay Wadhai
xiv Contents

Biogas Monitoring System Using DS18B20 Temperature Sensor and


MQTT Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 567
Suruchi Dedgaonkar, Aakankssha Kaalay, Nitesh Biyani
and Madhuri Mohite
Time-Efficient and Attack-Resistant Authentication Schemes in
VANET . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 579
Sachin Godse and Parikshit Mahalle
Inferring User Emotions from Keyboard and Mouse . . . . . . . . . . . . . . . 591
Taranpreet Singh Saini and Mangesh Bedekar
An Overview of Automatic Speaker Verification System . . . . . . . . . . . . 603
Ravika Naika
Topic Modeling on Online News Extraction . . . . . . . . . . . . . . . . . . . . . . 611
Aashka Sahni and Sushila Palwe
Spam Mail Detection Using Classification Techniques and Global
Training Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 623
Vishal Kumar Singh and Shweta Bhardwaj
Smart Gesture Control for Home Automation Using Internet of
Things . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 633
Sunil Kumar Khatri, Govind Sharma, Prashant Johri and Sachit Mohan
A Proposed Maturity Model for Himachal Pradesh Government
e-Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 643
Alpana Kakkar, Seema Rawat, Piyush Gupta and Sunil Kumar Khatri
Malaria Detection Using Improved Fuzzy Algorithm . . . . . . . . . . . . . . . 653
Mukul Sharma, Rajat Mittal, Tanupriya Choudhury,
Suresh Chand Satapathy and Praveen Kumar
Feature Extraction Techniques Based on Human Auditory System . . . . 667
Sanya Jain and Divya Gupta
Movie Recommendation System: Hybrid Information Filtering
System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 677
Kartik Narendra Jain, Vikrant Kumar, Praveen Kumar
and Tanupriya Choudhury
Eco-Friendly Green Computing Approaches for Next-Generation
Power Consumption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 687
Seema Rawat, Richa Mishra and Praveen Kumar
Implementing Test Automation Framework Using Model-Based
Testing Approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 695
Japneet Singh, Sanjib Kumar Sahu and Amit Prakash Singh
Contents xv

Improved Exemplar-Based Image Inpainting Approach . . . . . . . . . . . . 705


Hitesh Kumar, Shilpi Sharma and Tanupriya Choudhury
The Hidden Truth Anonymity in Cyberspace: Deep Web . . . . . . . . . . . 719
Saksham Gulati, Shilpi Sharma and Garima Agarwal
Test Case Optimization and Prioritization of Web Service Using
Bacteriologic Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 731
Gaurav Raj, Dheerendra Singh and Ishita Tyagi
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 745
About the Editors

Prof. Subhash Bhalla joined as a Faculty School of Computer and Systems


Sciences, Jawaharlal Nehru University (JNU), New Delhi, in 1986. He was a
Visiting Scientist at Sloan School of Management, Massachusetts Institute of
Technology (MIT), Cambridge, Massachusetts, USA (1987–1988). He is a Member
of the Computer Society of IEEE and SIGMOD of ACM. He is associated with the
Department of Computer Software at the University of Aizu, Japan. He has also
toured and lectured at many industries for conducting feasibility studies and for the
adoption of modern techniques. He has received several grants for research projects.
He currently participates in the Intelligent Dictionary System Project. He is
exploring database designs to support models for Information Interchange through
the World Wide Web. He is working with a study team on creating user interfaces
for Web users and transaction management system for mobile computing. He is
studying transaction management and algorithmic designs for distributed real-time
systems. He is also pursuing performance evaluation and modeling of distributed
algorithms. His research interests include managing components and application
services; distributed client/middleware/service-oriented computing; XML,
e-commerce; mobile database management systems; Web query and Web data
mining; synchronization and crash recovery; and integration of technologies.
Prof. Vikrant Bhateja is Associate Professor, Department of Electronics and
Communication Engineering, Shri Ramswaroop Memorial Group of Professional
Colleges (SRMGPC), Lucknow, and also the Head (Academics and Quality
Control) in the same college. His areas of research include digital image and video
processing, computer vision, medical imaging, machine learning, pattern analysis
and recognition, neural networks, soft computing, and bio-inspired computing
techniques. He has more than 90 quality publications in various international
journals and conference proceedings. He has been on TPC and chaired various
sessions from the above domain in the international conferences of IEEE and
Springer. He has been the track chair and served in the core technical/editorial
teams for the international conferences: FICTA 2014, CSI 2014 and INDIA 2015
under Springer-AISC Series, and INDIACom-2015 and ICACCI-2015 under IEEE.

xvii
xviii About the Editors

He is Associate Editor in International Journal of Convergence Computing


(IJConvC) and also serving in the editorial board of International Journal of Image
Mining (IJIM) under Inderscience Publishers. At present, he is guest editor for two
special issues floated in International Journal of Rough Sets and Data Analysis
(IJRSDA) and International Journal of System Dynamics Applications (IJSDA)
under IGI Global Publications.
Dr. Anjali A. Chandavale is currently working as Associate Professor
(Information Technology) in Maharashtra Academy of Engineering and Educational
Research’s Maharashtra Institute of Technology College of Engineering, Pune,
India. She has over 18 years of teaching and over 6 years of industrial experience in
the field of process instrumentation. Her research interests include Internet security,
image processing, and embedded systems. She has worked as Research and
Development Engineer in Lectrotek Systems (Pune) Pvt Ltd, Pune, for 4 years and
also as a Software Engineer (Design and Development) in Ajay Electronics Pvt Ltd
(1997–1998), Pune. She has several publications in journals as well as in conference
proceedings of international repute.
Prof. Anil S. Hiwale is currently working as Professor and Head of Department of
Information Technology, MIT College of Engineering, Pune. He completed his Ph.D.
from SGB Amravati University, Amravati. Prof. Hiwale has 28 years of teaching
experience and published over 50 research papers in National/International Journals
and conferences. His areas of research include signal processing, digital communi-
cations, multi-antenna systems and satellite communications. He is presently
supervising four Ph.D. scholars. He is a Fellow of Institution of Engineers (India) and
a member of IET, CSI, ISTE and Broadcast Engineering Society of India.
Prof. Suresh Chandra Satapathy is currently working as Professor and Head,
Department of Computer Science and Engineering, PVP Siddhartha Institute of
Technology, Andhra Pradesh, India. He obtained his Ph.D. in Computer Science
and Engineering from JNTU Hyderabad and M.Tech. in CSE from NIT Rourkela,
Odisha, India. He has 26 years of teaching experience. His research interests
include data mining, machine intelligence, and swarm intelligence. He has acted as
program chair of many international conferences and edited six volumes of pro-
ceedings from Springer LNCS and AISC series. He is currently guiding eight
scholars for Ph.D. He is also a Senior Member of IEEE.
35 W GaN Solid-State Driver Power
Amplifier for L-Band Radar Applications

Vivek Ratnaparkhi and Anil Hiwale

Abstract In this paper, 35 W driver power amplifier was designed and simulated
using GaN HEMT for L-band radar. GaN HEMT is used because it can provide
high output power and high gain as compared to other semiconductor technologies.
The 35 W output power is generated using CGHV40030 GaN HEMT which is
sufficient to drive further stages of power amplifier. The driver amplifier is designed
at 1.3 GHz of center frequency. This amplifier is designed in class AB and 60.5%
of PAE is achieved.

Keywords Class AB  GaN HEMT  L-band radar  PAE

1 Introduction

Rapid development in the field of gallium nitride (GaN) semiconductor devices


since last two decades is changing the rules of power amplifier design for wireless
communications. To generate and amplify high microwave power, people were
using microwave tubes which are having certain limitations. It is all dependent on
particular application where microwave tube is used for signal generation and
amplification. For microwave applications, traveling wave tube tubes (TWT),
magnetrons, and klystrons were conventionally used. TWT amplifiers have certain
limitations such as high noise, shorter lifespan, and wide bandwidth which results in
interference with other wireless communication system operating in an adjacent
band. Consequently, there is a strong desire for solid-state power amplifiers (SSPA)
that are superior in long-term reliability and signal noise to replace conventional
TWT amplifiers at microwave frequencies [1–3]. GaN devices are becoming a

V. Ratnaparkhi (&)
Department of EXTC, SSGMCE, Shegaon, Maharashtra, India
e-mail: ratnaparkhi_vivek@yahoo.co.in
A. Hiwale
Department of IT, MITCOE, Pune, Maharashtra, India
e-mail: anil.hiwale@mitcoe.edu.in

© Springer Nature Singapore Pte Ltd. 2018 1


S. Bhalla et al. (eds.), Intelligent Computing and Information and Communication,
Advances in Intelligent Systems and Computing 673,
https://doi.org/10.1007/978-981-10-7245-1_1
2 V. Ratnaparkhi and A. Hiwale

Table 1 Comparative analysis of different device types


Device type Pmax Efficiency Gain Bias voltage Operation
(kW) (%) (dB) (kV) time
GaN devices 0.8 50–80 10–20 0.025–0.1 High
Power grid tubes 0.5–10 50–60 10–15 0.5–10 Less
Electron beam 0.1– 25–60 20–45 25–100 Moderate
devices 2000

promising choice for SSPA design for microwave applications. Most of the tran-
sistor manufacturers are now developing GaN high-power transistors with attractive
performance characteristics. Table 1 shows the comparison of power devices family
on the basis of device characteristics. It is apparent that new GaN semiconductor
devices are capable of producing almost 1 KW of output power with the highest
efficiency of 65%. If several stages of solid-state power amplifiers are combined
properly, very high output power in the range of few kilowatts can be generated. It
is also important to note that lifetime of power amplifiers using SSPDs is very high
when compared with the power grid tubes (PGTs) and electron beam devices
(EBDs) such as traveling wave tubes (TWTs) and klystrons. From the reliability
point of view, SSPDs are more reliable than PGTs and EBDs.
GaN solid-state transistors have the potential to disrupt very large vacuum tube
market and can replace some conventional vacuum tubes. There is high demand for
GaN SSPAs for microwave applications.

2 GaN Device Technology

For radar applications, traveling wave tubes (TWT) such as magnetrons and kly-
strons were conventionally used because of the required power level as high as
1 kw [4]. GaN transistors were first demonstrated in the 1990s and have started to
become commercially available in last decade [5]. GaN transistors have many
advantages when it is compared with other semiconductor materials like Si, GaAs,
and SiC. Table 2 compares material characteristics of Si, GaAs, SiC, and GaN. It is
apparent that GaN has higher breakdown voltage which allows GaN HEMTs to

Table 2 Material parameters comparison


Property Si GaAs SiC GaN
Band gap energy (eV) 1.11 1.43 3.2 3.4
Critical breakdown field (MV/cm) 0.3 0.4 3.0 3.0
Thermal conductance (W/cm K) 1.5 0.5 4.9 1.5
Mobility(cm2/V s) 1300 6000 600 1500
Saturated velocity (107 cm/s) 1.0 1.3 2.0 2.7
JFOM versus Si 1.0 1.7 20 27
35 W GaN Solid-State Driver Power Amplifier for L-Band … 3

operate at biasing voltages about 50VDC. Large drain voltages lead to high output
impedance per watt of RF power and result in easier matching circuit design.
Since GaN HEMT devices have higher impedance than other semiconductor
devices, this can help to enhance the PAE and bandwidth of the required SSPA.
High-saturated drift velocity results in higher saturation current densities and watts
per unit periphery. This ensures GaN HEMTs suitability for switched-mode power
amplifiers [6].
It is evident that high-power amplifiers made by Gallium arsenide produce high
efficiency than silicon high-power amplifiers. GaN devices even provide higher
efficiencies than GaAs power amplifiers. Due to such high-efficiency capabilities,
GaN high-power SSPAs are being used extensively in microwave applications.
GaN devices can operate at higher voltage and have higher saturated velocity which
allows GaN transistors to generate higher power in smaller space which results in
high power density. Consequently, smaller size high-power amplifiers can be
fabricated with GaN transistors.
There are many researchers and manufacturers working in the field of
GaN SSPA design for microwave applications. Recently, solid-state power
amplifiers designed using GaN HEMT devices have replaced many conventional
vacuum tubes used for radar and space applications. It is expected that GaN
technology will certainly grow and will be promising choice for high output power
applications at microwave frequencies with high reliability and lesser noise when
compared to conventional vacuum tubes.

3 GaN SSPA Design

Over the last decade, GaN-based high electron mobility transistors (HEMTs) have
emerged as excellent devices for a number of applications [7]. GaN HMTs tech-
nology has been shown to provide high power and high efficiency making it the
perfect candidate for this next-generation radar system [8]. George Solomon [9] and
his group from Communications and Power Industries, LLC Beverly Microwave
Division have reported the VSX3622, a 1.5 kW X-B, and GaN power amplifier for
radar applications. In this section, a step-by-step design of GaN HEMT driver
power amplifier for L-band radar applications is explained.
Figure 1 shows topology of proposed solid-state power amplifier for L-band
radar applications. Using proposed topology, at least 500 W output power can be
achieved. In this paper, design and simulation of GaN solid-state driver power
amplifier are discussed.
4 V. Ratnaparkhi and A. Hiwale

Fig. 1 Topology of proposed GaN SSPA

4 Results

In this section, simulation results of GaN driver power amplifier are presented.
Keysigth’s ADS software is used for design and simulation of GaN driver power
amplifier. Since our requirement is to generate at least 30 W output power from
driver stage, CGHV40030 GaN HEMT is selected.

4.1 DC Analysis

Cree’s CGHV40030 GaN HEMT is used for designing driver power amplifier [10].
First stage of PA design is to carry out DC analysis and find out the operating point
of proposed amplifier. Since maximum output power is expected, class AB is the
best choice for proposed driver power amplifier. Upon performing DC analysis in
ADS, VDS = 48 V and VGS = −3 V selected as operating points, which ensures
IDS = 20 mA. The device power consumption at this bias is 88 mW.

4.2 Stability Analysis

It is very important to perform and ensure stability of the device before proceeding
for further design. Any instabilities of the device may generate unwanted oscilla-
tions and amplifier performance will affect significantly. Device may have
unconditionally stable or conditionally stable. There are two stability checks
available to check stability of the device: stability factor and stability measure.
35 W GaN Solid-State Driver Power Amplifier for L-Band … 5

m2
2.4

2.2
m2
freq=1.300GHz
2.0 StabFact1=1.902
StabMeas1
StabFact1

StabMeas1=1.407
1.8

1.6

1.4

1.2
1.00 1.05 1.10 1.15 1.20 1.25 1.30 1.35 1.40 1.45 1.50
freq, GHz

Fig. 2 Stability factor and stability measure

Figure 2 shows stability factor greater than one and stability measure greater than
zero which ensures that device is unconditionally stable. This stability analysis is
performed after proper DC biasing to the device.

4.3 Load Pull Analysis

Load pull analysis is the important step in PA design. Having a good nonlinear
model is essential for starting PA design. We have obtained nonlinear model of
CGHV40030 from device manufacturer. Load pull analysis is carried out using
nonlinear models of the device to find out optimum impedance to be presented to
device for specific output power, PAE, IMD, etc. Once optimum load and source
impedances are found using load pull, impedance matching network is designed.
For CGHV40030 GaN HEMT, load pull analysis is performed and results are
shown in Fig. 3.

4.4 Impedance Matching Network Design and Complete


Amplifier Performance

Once load pull analysis is completed and obtained values for source and load
impedances, input and output impedance matching networks can be designed.
Results of complete amplifier with input and output matching networks after some
6 V. Ratnaparkhi and A. Hiwale

optimization are shown in this section. Figure 4a shows output power of designed
GaN SSPA, which is almost 35 W. Figure 4b shows PAE of designed GaN SSPA
and it is acceptable for our proposed driver amplifier.

Fig. 3 Results of load pull simulation at maximum power and gain

(a) 50 m1
40
m1
freq=1.300GHz
dBm(Vout)=45.328
30
dBm(vout)

20

10

-10

-20
0 1 2 3 4 5 6 7
freq, GHz

(b) freq PAE1


1.300 GHz 60.494

Fig. 4 a Output power, b power added efficiency


35 W GaN Solid-State Driver Power Amplifier for L-Band … 7

5 Conclusion

Solid-state driver power amplifier using CGHV40030 GaN HEMT is designed at


1.3 GHz for L-band radar applications. Output power of 45 dBm and PAE of
60.494% are achieved. Load pull analysis is carried out to determine device output
and input impedances. The nonlinear model of the device is obtained from device
manufacturer. Complete GaN SSPA with four parallel cascaded stages with power
divider and combiner can be designed for generating 500 W of output power.

References

1. Allen Katz and Marc Franco “GaN comes of Age” in IEEE microwave magazine, December
2005. pp. 524–534.
2. David Schnaufer “GaN: The Technology of the Future http://www.rfglobalnet.com/doc/gan-
the-technology-of-the-future-0001.
3. A. Katz et al. “A linear GaN UHF SSPA with record high efficiency,” in IEEE MTT-S Int.
Microwave Symp. Dig., Boston, MA, June 7–12, 2009, pp. 769–772.
4. Ken Kikkuchi et al., “An X-Band 300-Watt Class High Power GaN HEMT Amplifier for
Radar Applications”, SEI Technical Review, Number 81, October 2015, pp. 40–44.
5. Francesco Fornetti “Characterisation and performance optimization of GaN HEMTs and
amplifiers for Radar applications” December 2010.
6. Andrew Moore and Jose Jimenez “GaN RF Technology For Dummies”, TriQuint Special
Edition Published by John Wiley & Sons, Inc. 111 River St. Hoboken, NJ 07030-5774,2014.
7. Guest Editorial Special Issue on GaN Electronic Devices “IEEE Transactions on Electron
Devices,” vol. 60, no. 10, October 2013, pp. 2975–2981.
8. T. Thrivikraman and J. Hoffman, “Design of an ultrahigh efficiency GaN high-power
amplifier for SAR remote sensing,” in IEEE Aerospace Conference, pp. 1–6, 2013.
9. George Solomon et al., “The VSX3622, a 1.5 kW X-band GaN Power Amplifier for Radar
Application”, Communications & Power Industries LLC, Beverly Microwave Division.
10. Cree’s Datasheet Online available at: http://www.wolfspeed.com/cghv40030.
Validation of Open Core Protocol
by Exploiting Design Framework Using
System Verilog and UVM

Gopika Rani Alekhya Pamarthy, M. Durga Prakash


and Avinash Yadlapati

Abstract Today’s scenario of semiconductor technology is a tremendous inno-


vation; it includes a large number of intellectual property (IP) cores, interconnects,
or buses in system on chip (SOC) design and based upon the necessity its com-
plexity keeps on increasing. Hence, for the communication between these IP cores,
a standard protocol is developed. The necessity of IP reuse, abridging the design
time and the complexity makes large-scale SOC more challenging in order to
endorse IP core reusability for SOC designs. An efficient non-proprietary protocol
for communication between IP cores is open core protocol (OCP). OCP comes
under socket-based interface and openly licensed core concentric protocol. This
paper addresses on the verification of implemented design of OCP. The proposed
paper is to verify the implemented design by using System Verilog and Universal
Verification Methodology (UVM) in SimVision tool.


Keywords Open core protocol (OCP) Intellectual property (IP)
 
System on chip (SOC) Socket-based interface Core concentric

1 Introduction

Open core protocol (OCP) is a competent protocol for communication on SoC.


OCP [1] compliance IP cores can be reversed by the designer, depending on system
integration and verification approach in multiple designs without reinstallation,

G. R. A. Pamarthy (&)  M. Durga Prakash


Department of Electronics and Communication Engineering, K L University, Guntur,
Andhra Pradesh, India
e-mail: alekhya.rani.gopika@gmail.com
M. Durga Prakash
e-mail: mdprakash82@gmail.com
A. Yadlapati
CYIENT Ltd, Hyderabad, India
e-mail: avinash.amd@gmail.com

© Springer Nature Singapore Pte Ltd. 2018 9


S. Bhalla et al. (eds.), Intelligent Computing and Information and Communication,
Advances in Intelligent Systems and Computing 673,
https://doi.org/10.1007/978-981-10-7245-1_2
10 G. R. A. Pamarthy et al.

reducing the development time, cost, and design risk. OCP is an interface for
communication between IP cores on an SOC. OCP defines a bus-independent
configurable interface.
OCP renovates IP cores making them independent of the architecture and design
of the systems in which they are used and shortens system verification and testing
by providing a secure boundary around each IP core. OCP is simple, synchronous,
point-to-point, highly scalable, and configurable to match the communication
requirements associated with different IP cores. Even complex high-performance
cores can be accommodated capably with OCP extensions. Cores with OCP
interfaces enable true plug-and-play [2] approach and automated design processes,
thus allowing the system integrator to choose the best cores and best interconnect
system.
Unlike bus approach, with reference to the standard communication approach,
there are mainly two protocols: VCI (Virtual Component Interface) and OCP. OCP
which is scalable and bus independent is a superset of VCI which reports only data
flow aspects; moreover, OCP supports sideband control signaling and tests harness
signals which are configurable. OCP is the only protocol which unifies all the
inter-core communication. OCP establishes a point-to-point interface between two
IP cores [3]. One of them acts as the master who is the controller and generates the
commands and other as the slave responding to commands generated by the master,
either by accepting or giving data to the master.
The OCP defines a point-to-point interface between two communicating entities
such as IP cores and bus interface modules (bus wrappers). One entity acts as the
master of the OCP instance and the other as the slave. Only the master can present
commands and is the controlling entity. The slave responds to commands presented
to it, either by accepting data from the master or presenting data to the master. For
two entities to communicate in a peer-to-peer fashion, there need to be two
instances of the OCP connecting them—one where the first entity is a master, and
one where the first entity is a slave.

2 Project Scope

Implementation is carried out using behavioral Verilog HDL [4] simulation envi-
ronment. The design implements a simple memory read and write operations and
Burst transactions between two IP cores. The design complies with subset of
OCPIP handshake signals. The implemented design, i.e., DUT, is verified using
system Verilog and UVM. As the system Verilog is superset of Verilog and is based
upon OOPS [5] (Object Oriented Programming) concepts, the environment can be
extended without modifying the intention of the original existing code by adding all
the required new features.
Validation of Open Core Protocol by Exploiting Design Framework … 11

3 OCP Protocol

OCP is a configurable protocol that defines one of the communicating entities as


master and other as slave. Master initiates the operation by generating a request
signal to the slave, and in turn slave responds by sending the acknowledgement to
the master. Once master receives the acknowledgement [5] from slave, it transmits
the data to the slave; this phenomenon illustrates the typical handshaking process of
communication as shown in Fig. 1.

3.1 OCP Signal Description

The dataflow signals consist of a small set of required signals and a number of
uncompelled signals that can be configured to support additional requirements [1].
The dataflow signals are grouped into basic signals, burst extensions (support for
bursting). The naming conventions for dataflow signals use the prefix M for signals
driven by the OCP master and S for signals driven by the OCP slave [3].
• Clk: Input clock signal for the OCP clock.
• Maddr: Input address to the master in which data has to be written into the
corresponding memory location and is to be accessible later during read oper-
ation. Maddr width is configurable.
• MCmd: Mode assignment command of width 3. This signal specifies the mode
of OCP which is requested by the master. Usually, depending upon the com-
mand generated by the master, slave responds and performs that operation.
If OCP is in idle state, it does not perform any mode of transfer, whereas during
non-idle state depending on the direction of data flow, OCP [2] performs either
read/write operation.
• Mdata: The data sent by the master that has to be written into the prescribed
memory location of slave which is a configurable one.
• MDatavalid [6]: This is the indication to the slave that the data sent by the
master is valid only. When it is set, it specifies that the Mdata field is valid.
• MRespAccept: Acknowledgment from master that the response from slave was
accepted by it when MRespAccept is set.

Fig. 1 Signal transmission between master and slave


12 G. R. A. Pamarthy et al.

• SCmdAccept: Acknowledgment from slave that the response from master was
accepted by it when SCmdAccept is set.
• Sresp: Response from the slave to a transfer request from the master. It is of
width 2.
• SData: It transfers the requested data by master as read data from the slave to
the master.
• MBurstLength: This illustrates configurable number of transfers in a burst.
MBurstLength of value 0 is illegal.
• MBurstPrecise: This specifies whether the precise burst length is known at the
start of the burst or not.
• MBurstSeq: This 3-bit-width field indicates the sequence of addresses for
requests in a burst.
• SRespLast: Last response from the slave in a burst.
• MReqlast: Last request from the master in a burst.

4 Functional Description

The data transfer between master and slave is communicated non-serially.


Commands are generated by the master to the slave. Based on the command given
by the master, slave responds and decides the mode of operation need to be per-
formed that is requested by the master. Data is either written or read based upon the
command from master into the particular memory location which is specified by the
master [6].

4.1 Master

Master is the one who starts the transactions by providing data and address to the
slave. It is the commander and controller of the entire design. It makes the slave to
function on what it needs. The basic block diagram of master with all the input and
output signal specifications is shown in the figure.
Master activates the OCP by sending command, address, and data to the slave
when clock is active. Slave responds to the master’s command and sends an
acknowledgment to the master indicating the acceptance of command from master
as SCmdAccept [7]. Write/read mode of transmission is performed based on the
master’s request. In order to indicate that the data sent by master is valid, it sends a
valid bit on MDatavalid to the slave; on receiving it, slave starts writing the data in
the corresponding memory location. Similarly, master reads the data from slave by
activating data to be read on SData by specifying the exact memory location.
Master block with all its inputs and outputs driving to slave are shown in Fig. 2.
Validation of Open Core Protocol by Exploiting Design Framework … 13

Fig. 2 OCP master block

4.2 Slave Block

Slave simply performs the operation depending on the command sent by the master.
It activates itself to respond on to the master request. Data handshaking process of
communication is adopted to have a proper and efficient communication [8]. Slave
acknowledges for each and every signal from master as a correspondence or
acceptance of request from the master. The detailed slave block is shown in Fig. 3.
Slave responds to the request sent by the master [9]. It performs read/write mode
of transfer by responding to the signals from master. Slave acknowledges the master
for each and every transfer at enabled clock. During read mode of operation, it
acknowledges the master that the data sent by it is a valid one by sending its

Fig. 3 OCP slave block


Another random document with
no related content on Scribd:
CHAPTER XXXIV.
THE CONQUEST ACHIEVED.

July-August, 1521.

The Destroyers Advance—Fierce Fighting in the Plaza—Dismal Situation


of the Mexicans—The Work of Demolition—Movements of Alvarado—
The Emperor Refuses to Parley—Misery of the Aztecs Unbearable—
Horrible Massacre of Women and Children—The Tender-hearted
Cortés Mourns over his own Work—Capture of the Emperor—The
Conquest Completed—Banquets and Thanksgivings—Dispersion of the
Allies to their Homes—Reflections.

With a force of over one hundred and fifty thousand men the
Spaniards now advanced on the city, a large proportion destined
wholly to raze buildings, fill channels, and remove obstacles, while
the rest were to drive back the enemy and keep them at bay. At the
channel near the plaza the Mexicans detained the forces for an hour
with a peace proposal, in order to gain time for some operation, and
then suddenly they began to ply their missiles. Cortés was not slow
to accept the challenge, and led the attack with a recklessness that
caused his followers to remonstrate with him for exposing so
valuable a life. It had the effect, however, of so encouraging the
charging party that the channel with its intrenchments was quickly
captured. On reaching the plaza they found it covered with loose
stones, which prevented the horses from running. Several streets
leading to it were blocked with stone barricades. The main effort for
this day was directed toward opening the approach to the plaza,
which was to serve as the starting-point for subsequent movements.
The work was slow, owing to the massive character of the buildings
along the leading avenue, and in this imperial centre of the city; but
myriads swarmed thereat, and structure after structure was levelled,
opening wide access to the southern causeway.
The Mexicans made repeated efforts to stay such ruthless
destruction. But their onslaught was futile, for thundering cannon and
fiery chargers protected every point. “Burn and raze, you slaves,”
they shouted to the auxiliaries in their impotent fury; “you will have to
rebuild it all, either for us if we win, or for your present masters if they
conquer!” And so it happened. With dreary tasks did they pay for the
momentary triumph over their enemy. During the withdrawal of the
troops to camp in the evening the Mexicans were able to make a
forcible demonstration, more so than usual on these occasions, if we
may credit the native records. They pushed in front of their lines a
fine-looking Spanish cross-bowman, reserved from the late captives,
and sought to make him direct his arrows against his countrymen.
This he refused to do, always shooting too high, and finally the
enraged Aztecs cut him down. His presence naturally interfered with
the free operations of the soldiers, as the enemy had expected.
On the following days Cortés ascended the commanding temple
pyramid in the plaza, and thence directed more effectively the
operations for razing buildings and driving back the Mexicans, who
fought with desperation for every foot of ground, so much so that on
one day alone fell twenty thousand it is said. On one occasion a
corps of Tlascaltecs crossed a canal and were thrown into disorder
by the enemy. The Aztecs began to exult, and one of their number, a
muscular warrior with enormous bejewelled plumage, armed with a
Spanish sword and shield, shouted a challenge to any Spaniard.
Several were ready, among them Hernando de Osma, who had just
swum across the canal to sustain the wavering allies. Dripping wet
he rushed upon the warrior, but received a blow which cleft his
shield. Recovering himself, he dealt the Mexican a thrust from below
and stretched him dead, whereupon he snatched the sword and
plumage and sprang back in time to escape the pursuing friends of
the fallen man. He afterward offered the trophy to Cortés, who
accepted, but returned it at once with the remark that none was so
worthy thereof as he who had won it. The deed served also to
reanimate the Tlascaltecs, and they sustained their position.
Not long after, another powerful warrior, similarly plumed, came
forth brandishing a Spanish sword and announcing that he sought
the glory of either dying by the hand of a brave Spaniard or defeating
him. Cortés, who was present, told him that ten more men like
himself were needed to match one soldier. The warrior insisted.
“Very well,” said the general, “this beardless page of mine shall
despatch you, and demonstrate the mettle of our Castilian boys.”
Juan Nuñez de Mercado, as the youth was called, thereupon
stepped forward, and bravely as this Goliah fought, a few passes
from the skilled arm of the youngster soon sufficed to lay him low.
This feat served not alone to discourage duels with Spaniards, but
was regarded by many Mexicans as a bad omen.[1190]
Whatever may have been the reverses of the enemy, they
usually rallied in the evening to pursue the troops as they returned to
camp, the allies being always sent back first so as to leave the road
clear for the soldiers, covered by the cavalry. One day the pursuit
was not made for some reason, and a few horsemen ventured to
look into it, but only to be driven back with two animals badly
wounded. Cortés resolved to be avenged. He ordered Sandoval to
reënforce him so as to increase the number of horse to forty. Thirty
of these were posted early in the day in a hiding-place near the
plaza, and close by a hundred select soldiers and a corps of
Tlascaltecs. When the hour came to return to camp, the Mexicans,
as expected, fell upon the retreating lines in stronger force than ever,
encouraged by the achievement of the previous evening and by the
pretended timidity of the ten horsemen who covered the rear. When
the first columns of pursuers had well passed the hiding-place, the
signal was given, and with ringing Santiagos the parties in ambush
rushed upon the startled warriors. Finding their retreat cut off, the
severed section lost presence of mind, and permitted themselves to
be butchered like cattle. When the massacre was over, fully five
hundred of the flower of the Aztec armies covered the ground.[1191]
Never again were the Spaniards exposed to pursuit near or beyond
the plaza, or indeed to any such fierce charges, and the horses
became again an object of awe.[1192]
The captives were questioned regarding the condition of the city,
and from them a revelation was obtained showing that the majority of
the occupants were in favor of capitulation, but afraid to express their
views in face of the firmness of Quauhtemotzin and his party, who
were resolved to defend their city to the end. And there was still
enthusiasm among the Mexican people. Women and cripples could
be seen preparing and bringing war material for stronger arms to
use; they swept dust from the roofs into the faces of assailants, while
children threw tiny stones and lisped an echo of the curse that fell
from the lips of their parents. But all this manifest spirit was slowly
but surely subsiding, and deep and dismal woe was settling down
upon them.[1193] Alas for Mexico, pride of the grand plateau! Alas for
thine ancient grandeur! Blotted out forever must be thy culture,
crushed thy budding progress! The days of thy glory are ended; and
so are thy bloody ceremonies and sacrificial stones!
Long sieges had never suited the native ideas of warfare, and
experience could therefore teach little in the preparation for the
event. Vast supplies had been accumulated by the Mexicans, but a
large influx of fugitives from the lake towns had swelled the number
of non-combatants and had helped to diminish the food supply,
which had received but scanty additions, owing to the close watch of
the cruisers. Nor had any restrictions been placed on consumption,
since the provisions were chiefly in private hands. Now famine was
raging with rapidly increasing horrors, and jewels were offered by the
handful for an equal quantity of food.[1194] Excluded from such
competition, the poorer classes sought in holes and canals for snails,
lizards, and rats, skimmed the surface of the water for its
mucilaginous scum, or tore up the earth for roots and weeds, glad
even to chew the bark of trees, and anxiously waiting for the scanty
allowance of brackish water. Disease was marching hand-in-hand
with hunger, and weakened by their sufferings hundreds were left to
linger in torment till welcome death relieved them. The frequency of
these incidents made the people callous, and the sufferings even of
near friends were looked on with indifference by the gaunt and
hollow-eyed, who were themselves marked for death.
Regardless of the consequences, many crept at night close to
the Spanish camps in search of roots and refuse which could no
longer be found within their precincts. Advised of such movements, a
body of soldiers and allies was sent out before sunrise one day and
fell on a large number, slaughtering many of them before discovering
them to be starving women and children.[1195] It was necessary to
take increased measures even against these surreptitious attempts
to sustain the defence, and to keep in the useless population, though
there was little prospect of any important exodus, since the fear of
the savage and cannibal auxiliaries who surrounded the city made its
very pest-holes appear attractive places of refuge. The vessels were
particularly efficient for this purpose, the more so since the crews
had found a ready means to render the submerged stakes and
palisades of little hindrance.[1196] They were thus enabled to ravage
the suburbs, and to coöperate with the other forces by landing and
driving the inhabitants toward the narrow quarter in which they were
now confined. They had not always an easy task, however, for the
Mexicans were growing more reckless, and would sometimes
venture to meet even the ‘winged houses.’
On one occasion a portion of the fleet was closely beset in a
confined place, and the flag-ship happening to strand on some
timbers the crew became panic-stricken and sought to abandon her.
Martin Lopez, the builder, who was the chief pilot, at once turned
against the deserters, and being a large and powerful man he
pitched two into the water, beat and bruised half a dozen others, and
soon compelled their return to duty. He thereupon led them against
the enemy and drove them off, killing the leader, who was a
prominent officer. For this important service the brave Lopez was
rewarded with a captaincy.[1197]
Cortés made quite rapid advance in the work of demolition,
considering the immensity of it. The Tlacopan road had been
levelled, rendering communication easy with the camp of Alvarado,
and on the eve of Santiago’s day[1198] the greater part of the main
street to the market was gained. This thoroughfare bore afterward
the name of Guatemotzin,[1199] because this emperor’s palace was
here situated. Strongly fortified, its capture was not effected without
a severe struggle, wherein many a brave fellow met his fate. During
the fight Alderete’s horse became unmanageable from a thrust, and
rushed amid the enemy in mad fury, creating more disorder by his
pawing and biting than a squad of soldiers could have done.[1200]
Equally severe was the struggle on the following days in entering
and filling a street with a wide canal, adjoining the main road. At the
same time was taken a temple,[1201] wherein a number of impaled
bearded heads stared the horrified Spaniards in the face. Tears filled
the eyes of the beholders, and reverently the ghastly remains were
taken down to receive Christian rites.[1202]
The progress of Cortés’ party in the direction of Tlatelulco
market, the objective point of all the movements, had impelled
Alvarado to almost superhuman efforts to gain before them a spot
lying much nearer to his camp. Once within, he hoped to keep his
ground, for it was large and level, twice the size of the market-place
in Salamanca, says Cortés, and capable of accommodating sixty
thousand persons. It was lined with porticos, wherein more
substantial traders had their shops, while the open square was
covered with booths, between which the Spaniards had so often
wandered to gaze on products of every variety, from field and forest,
from river and mountain, as well as from the workshop of artisan and
artist.[1203] Thus it was formerly; but now were to be displayed only
the worst phases of human selfishness, cunning, and brutality; blood
and corpses in lieu of fabrics and provisions; fierce war-cries and the
clash of arms in place of merry traffickings and the clink of coin. By
the day following Santiago’s day Alvarado had levelled a wide
approach, and now he resolved to direct his whole strength against
this plaza, leaving merely a portion of his auxiliaries to attend to
further razing operations. Before dawn the next morning he
advanced with all his force and took the Aztecs by surprise. He
effected an entrance with little trouble, and was able to meet in good
order the bands which came to retrieve their neglect by fierce
charges. They were led by the renowned orders of Tigers and
Eagles, conspicuous in their corresponding gear, and eager to
maintain the reputation which had gained for them their insignia.
Mayehuatzin, lord of Cuitlahuac, was also among the prominent
leaders, but the cavalry soon obliged him to turn in flight, and
enabled the infantry to capture a number of the shops which lined
the market, and begin to pillage. Much more determined proved the
division under the Tiger captain, Coyohuehuetzin, who fell back and
maintained himself on the Momuztli edifice.
While the main portion of the Spanish forces thus fought at
different points in the plaza with varying advantage, Captain Gutierre
de Badajoz was ordered to capture the great temple which
overlooked the market. It was held by Temilotzin and Tlacatecatl,
who fiercely disputed his advance. Time and again were his men
driven back, or sent tumbling down the steps, bruised and bleeding,
many a one never to rise. But Badajoz persevered, and step by step
he climbed upward, sustained by reënforcements, till after two hours
of hard contest the summit was gained, first by Alférez Montaño.
Woe now to the defenders remaining! Not a Spaniard there but had
wounds to show, and not one who did not strive to exact blood for
blood. It was a repetition of the aerial combat of the year before on
the summit of the central temple. The Mexicans neither expected
mercy nor asked it; rather longed they to dedicate their last breath to
the gods, and gain by glorious death admission into the abode of the
blessed. By nine o’clock in the forenoon the two wooden towers
holding the altars and idols were gained, and the next moment
dense smoke columns rose to announce the victory of the
Spaniards.[1204] Loud rose the wail of the natives as they witnessed
the portentous result, and with the recklessness of despair they
renewed their onslaught, led by Axoquentzin and the Eagle captain,
Quachic. So severely pressed was Alvarado that he was obliged to
call down Badajoz and to concentrate his forces, abandoning the
several temples which surrounded the large pyramid. Encouraged by
this success the Mexicans pushed their advantage from all sides,
and unable to hold their position the Spaniards retired with
considerable loss, including three horses.[1205]
Nothing daunted, Alvarado repeated his entry on the following
day, and met with comparatively little opposition, the enemy being
evidently discouraged by the fall of the temple and the resolute
bearing of the Spaniards. He now passed through and came up to
Cortés’ party, by whom he was received with ringing and repeated
cheers. The latter had just captured the last canal and intrenchments
near the market-place, after a sharp struggle, and now the general
and his doughty lieutenant entered the market and ascended the
lofty pyramid, on which the royal banner waved a proud welcome,
while beside it the still impaled heads of white and dusky victims
recalled the bitter vengeance yet to be exacted. Surveying the city
beneath him on all sides, Cortés says: “It seemed undoubted that of
eight parts we had gained seven.” The late magnificent metropolis,
the finest and largest on all the northern continent, displayed now a
mass of ruins, through which the broad paths levelled by the
invaders led to the one corner which alone remained to the
besieged,[1206] wherein, amid famine, pest, and putrefying bodies,
they huddled in packed masses, sending forth from their midst the
groans of dying and loud lamentations, in an atmosphere so
pestiferous that the soldiers who entered the lately abandoned lanes
were almost stifled. People were found in different stages of hunger
and disease, meeting the soldiers with passive indifference in the
recklessness of despair. Beyond on the roofs stalked the warriors,
gaunt and yellow, like caged and starving beasts.
Cortés felt painfully oppressed on beholding so much misery,
and at once ordering a stay of hostilities he sent some captive chiefs
to Quauhtemotzin with peace proposals, showing the utter futility of
further resistance, which could involve only a needless infliction of
suffering and slaughter, and embitter against him and his the
besieging forces. He was prepared to forget all past animosity, and
respect the persons and property of the besieged, and his rights as
sovereign, and demanded in return only the renewal of allegiance
already offered in Montezuma’s time. Quauhtemotzin scarcely gave
the messengers time to speak, before he answered solemnly: “Tell
Malinche that I and mine elect to die. We will intrust ourselves
neither to the men who commit, nor to the God who permits, such
atrocities!”
Struck by the lofty bearing of the doomed, and desirous of
securing the treasure which the besieged assured him would all be
cast into the water before his fingers should touch it, Cortés again
sent a proposal, formally attested by notary and witnesses, declaring
that the responsibility for the terrible consequences which must
follow the rejection of his offer would fall wholly on the besieged. But
all without avail. And when the priests came and declared the oracle,
“Appeased by sacrifice the gods have promised victory after three
days,” Quauhtemotzin made answer, his council being present: “It is
well. And since it is so, let us have a care of the provisions, and if
need be die fighting like men. Let no one henceforth speak of peace
under pain of death!”
Preparations were accordingly made to renew hostilities at the
designated time, on which occasion sacred relics were to be brought
into service from the paraphernalia of Huitzilopochtli, one a twisted
snake sceptre set with mosaic, called the Xiuhcoatl, which was said
to become alive when launched against the foe and terrify them to
flight; the other a war-dress of feathers tipped with an owl’s head of
fearful aspect, an ægis to scatter the enemy.[1207]
Cortés on his side was not impatient to break the truce, for he
knew that hunger and disease were efficiently fighting his battle, and
he was besides busy constructing in the market-place a catapult
which was to soon end his labors there whatever might be the further
decision of the Mexicans. The idea had been suggested by a soldier
named Sotelo, who boasted of military science acquired during the
Italian wars; and since powder was becoming scarce the necessary
carpenters were readily furnished to construct the machine.
“Behold!” cried the Tlascaltecs, pointing it out to the Mexicans,
“behold a monster mechanism which will quickly annihilate you!” But
on trial it proved a failure.
Then messengers were again despatched to Quauhtemotzin to
talk of peace, and were told that they should have an answer soon.
Next day the Spanish sentinels observed a great commotion among
the Mexicans and a gathering of armed masses. They gave due
notice of this, but before the troops were fully prepared the enemy
came rushing from their retreats with a suddenness that threw the
first opposing lines in disorder, a number being wounded and several
killed, at least among the auxiliaries.[1208] The troops quickly rallied,
however, under cover of the artillery, and Cortés resolved to inflict
chastisement. Alvarado was ordered to attack a large ward
containing over a thousand buildings, while the remaining forces
should turn against the main quarter. Incited by the presence of the
mystic owl and the sacred snake-bearer, the Mexicans fought with
an indifference to fate that turned the war into a butchery. When the
survivors were driven back it was ascertained that over twelve
thousand Mexicans had been killed or captured.
The promised victory had proved a disastrous defeat, and even
the most hopeful Mexican sank into the depths of despair. This
feeling was greatly fostered by a strange occurrence about this time,
which the native records describe as a fiery whirlwind, resolving into
flames and sparks. It rose with great noise in the north, after sunset,
revolved over the doomed quarter and disappeared in the lake,
leaving the natives overwhelmed with apprehensions.[1209]
Their eyes were fully opened to the situation. And in pondering
on the dreadful past and present, the dreadful future became dim,
even its terrors growing every day fainter. They had been passive
under the pain of wounds and under hardships indescribable; but
when at last frenzied mothers and fathers seized upon their own
offspring to still the pangs of hunger over which sane minds no
longer had control; when others began furtively to look about for less
closely allied beings whereon to feed, then indeed a stranger and
more terrible fear came over them.[1210]
When Cortés returned with full force on the following day to
renew the fight, crowds of miserable beings came forth, repulsive in
their emaciated and haggard appearance, careless of their lives yet
clamoring for mercy and for bread. Moved by the appeal, he ordered
them not to be injured, and proceeded to answer certain chiefs who
had summoned him to a parley. “Son of heaven!” they cried, “within
one brief day and night the tireless orb returns. Why dost not thou
also finish thy task as quickly? Kill us, so that we may no longer
suffer, but enter paradise and join the happy throng already sent
thither!”[1211] He told them that in their hands was the remedy. They
had but to cease their insane opposition, and their suffering would
cease, for he would give them food and respect their persons and
property. No satisfactory answer was returned. They were evidently
afraid to speak of peace, though eager for it. Cortés felt convinced
that the emperor and a few leading nobles were the only persons
holding back, and willing to spare the people he again resolved on
an appeal.
A distinguished captive was prevailed on to carry this message
in order to give it more weight,[1212] and to use his influence with the
emperor. On appearing before Quauhtemotzin the noble began to
speak of the kind treatment he had received from the Spaniards.
Praise of this nature hardly accorded with the mood of the ruler or
with the views he wished to impart, and no sooner did the envoy
allude to peace than he was ordered away with an imperious sign to
the stone of sacrifice.[1213] Any fate for ruler and people was better
than to fall into the hands of Christian civilization. At the same time
the warriors faintly threw themselves against the Spaniards with
shouts of “Death or liberty!” The attack cost the besiegers a horse,
and several men were wounded, but the charge was easily repelled,
and was followed up by further slaughter. That night the allies
encamped within the city.
The following day Cortés again approached some nobles at an
intrenchment and asked, “Why remains the emperor so stubborn?
Why will he not come and speak with me, and stay the useless
slaughter of his subjects?” Bound by superstitious loyalty to their
ruler, weepingly they replied, “We know not; we will speak with him;
we can but die!” Presently they returned to say that Quauhtemotzin
would present himself in the market-place on the following noon.
Delighted, Cortés ordered a dais to be prepared on the raised
masonry platform recently used for the catapult, together with choice
viands. At the appointed hour the Spanish general appeared in state,
with the soldiers drawn up in line, ready to do honor to the
distinguished guest. After waiting impatiently for some time, they saw
five personages approach, who proved to be the bearers of excuses.
Quauhtemotzin could not come, but desired to learn the wishes of
Malinche.[1214]
Concealing his chagrin, Cortés caused the nobles to be
entertained, and then he sent them to their master with assurance of
good treatment; they soon returned with presents, and said the
emperor would not come. Again they were sent, and again their
efforts were unavailing. The truth is, Cortés desired with the monarch
to secure his treasure; else he would not long have stayed his
bloody hand. On the other hand, though Quauhtemotzin’s conduct
might be attributed to selfish obstinacy, he well knew that even for
his people death was to be scarcely more feared than capture; now
they might at once enter paradise, but the foreigners sought them
but to enslave.
The following day the five nobles again kept Cortés waiting with
a promise that the emperor would meet him. The hour having
passed without his appearance, the allies, who had been kept in the
background during the negotiations, were called forward and the
order was given for assault, Sandoval directing the fleet along the
shore and up the canals to the rear. “Since they will not have peace,
they shall have war!” cried Cortés. Then the carnage became fearful.
Spaniards and auxiliaries alike, two hundred thousand strong and
more, so it was said, abandoned themselves to the butchery, while
Satan smiled approval. In helpless despair, like cooped beasts in the
shambles, they received the death-blow as a deliverance.[1215] I will
not paint the sickening details so often told of chasms filled, and
narrow streets blockaded high with the dead bodies of the
unoffending, while down upon the living settled desolation. It must
indeed have been appalling when he who had brought to pass such
horrors writes: “Such was the cry and weeping of children and
women that not one amongst us but was moved to the heart.” Then
he attempts to throw upon the allies the blame of it. “Never,” he says,
“was such cruelty seen, beyond all bounds of nature, as among
these natives.” Already, before this massacre of forty thousand[1216]
the streets and houses were filled with human putridity, so that now
the Spaniards were forced to burn that quarter of the city to save
themselves from infection.
Another morrow engenders fresh horrors. The three heavy guns
are brought forward to assist in dislodging the besieged. Fearful lest
the emperor escape him in canoes, Cortés directs Sandoval to place
vessels on the watch for fugitives, particularly at the basin of
Tlatelulco,[1217] into which it is proposed to drive the besieged, there
to catch the king and nobles with their gold and jewels. Of a truth
Cortés does not wish to kill the miserable remnant of this so lately
proud race—particularly if thereby he loses the encaged treasure. So
he again appeals to them, and the Cihuacoatl,[1218] chief adviser of
the emperor, appears and is treated with great courtesy. After a time
he takes his departure, then for the first time declaring that
Quauhtemotzin will on no account present himself. “Return then,”
exclaims Cortés in ill-suppressed anger, “and prepare for death,
invoked, not by high and holy purpose, but by obstinate
timidity!”[1219]
Five hours are thus gained by the wily monarch for the escape of
the women and children, who pour out in swarms, the fainting
supported by the feeble, all emaciated and haggard, and many
marked by wounds or disease. Seeing which the allies pounce upon
them, all stricken and defenceless as they are, and murder them, to
the number of fifteen thousand. And the same number perish in the
fall of broken bridges, in the choked canals, and from the tread of
their fellow fugitives. How glorious is war! How noble the vocation!
How truly great the hero of such hellish deeds! Blush, oh sun! for
making such to-morrows; for lending thy light to human intelligence
by which to do such diabolical wickedness!
Observing no signs of surrender, Cortés opened fire with his
cannon and gave the signal of attack. Another massacre followed,
the Mexicans displaying the same apathy and sullen indifference to
death as on other late occasions. At some points, however, large
bodies surrendered, and the remaining Mexican quarters were fast
falling into the conqueror’s hands Sandoval on his side was closely
guarding the water front and preparing to coöperate. Entering the
harbor basin with a portion of the fleet, he bore down on the canoes
with a crash, upsetting the greater number, filled chiefly with nobles
and their families, of whom a large portion perished. The canoes
which escaped scattered in different directions, into canals and
corners, most of them however turning toward a nook of the basin
with the brigantines in hot pursuit. At this moment a few boats of
larger build emerged from a retreat at the other end and paddled
rapidly toward the open lake.
Warned by his commander to watch closely for the emperor,
Sandoval had not failed to observe the movement, and he
immediately directed García de Holguin, captain of the fastest
vessel, to overhaul the fugitives, who might be persons of note.
Aided both by sails and oars, Holguin speedily gained on them, and
they began to scatter in different directions, evidently with a view to
confuse him; but a captive on board indicated one as most likely to
contain the emperor.[1220] On approaching it the archers levelled
their cross-bows, whereupon a sign of surrender was made, with the
pleading cry that Quauhtemotzin was there. As the overjoyed
Holguin stepped down to secure his captives, among whom were the
young empress, the king of Tlacopan, and other prominent
personages,[1221] the monarch bade him respect his consort and his
retinue. As for himself, he was at his disposal.
Conducted by his captor, he passed along the streets to the
presence of the conqueror, the object of ten thousand eyes, for
rumor had preceded him. Men rested from the slaughter to gaze at
him. In the distance was heard the din of battle, but along the
captive’s path there fell a hush. His was a striking figure. The grave,
careworn face betokened suffering. He wore a dingy blood-stained
robe, and the pallor which overspread a naturally fair face was yet
more heightened by the feverish brilliancy of the eyes, now bent
dejectedly on the ground, now looking straight before him. He
walked with a firm step, and young as he was, the majestic dignity of
the prince and leader impressed every beholder. “He was quite a
gentleman,” graciously affirms Bernal Diaz. Cortés had stationed
himself on the roof of a high building in the Amaxac ward,[1222]
thence to direct operations, and now he caused a dais to be
prepared, and a table with refreshments. When the emperor
approached the guard drew up in line, and the general advanced
with benign dignity and led him to a seat by his side. “Malinche,” said
the captive, “I have done all within my power for the defence of my
people, but the gods have not favored me. My empire is gone, my
city is destroyed, and my vassals are dead. For what have I to live?
Rid me therefore of worthless existence.”[1223] Saying this, with his
hand he touched a dagger in the belt of Cortés. The general sought
to reassure him, declaring that none could resist the Christian’s God.
He had performed his duty bravely, like a good prince, and should be
treated as such.
Although the great end was thus accomplished, slaughter and
pillage were continued until long after vespers. Before the troops
withdrew to their respective camps, the prisoners, including the
pretty empress, Tecuichpo, were conducted to safe quarters in
Coyuhuacan. Shortly afterward a rain set in, aiding the efforts of the
Spaniards to check the auxiliaries in their maraudings, and this,
developing toward midnight into a furious storm with lightning and
thunder, seemed to the homeless Mexicans to be the xiuhcoatl of
Huitzilopochtli and the tumult of departing deities. To the conquerors
this flashing and thundering of heaven’s artillery was the salvo
attending victory, which was celebrated in feasting and merriment till
came late slumber with visions of gold, and lands, and vassals.
Thus ended Tuesday, the 13th of August 1521, sacred to St
Hippolytus, and accordingly adopted by the conquerors as patron
saint of the city. During colonial régime the day was annually
celebrated by a solemn festival, wherein the leading citizens and
officials rode on horseback in procession round the city, headed by
the viceroy and the alférez mayor bearing a banner commemorative
of the conquest.[1224] For seventy-five days consecutively, says
Cortés,[1225] the siege had been wreathing its coils midst almost
hourly scenes of bloodshed, wherein nearly one thousand Spaniards
and two hundred times that number of allies had taken part, one
hundred or thereabout of the former falling, and many thousands
among the latter.[1226]
As for the Mexicans, most of the early authorities assert that fully
one hundred thousand perished, besides those who died from pest
and famine.[1227] At the order of their sovereign, after the
proclamation of peace, the miserable remnant began to evacuate
their pest-holes, and to seek the fields adjacent, now lustrous green
under refreshing rains. Ah! it was pitiful, life to them now, this world a
great charnel-house filled with the bones of their loved ones, and
their hearts dead though still bleeding. What were their sins more
than those of others, that they should be so stricken, that they should
be so ground to the dust while the conquerors flushed with victory
were exulting before God because he had so ordered and
accomplished? They had sacrificed human beings on the altars of
their gods, sixty thousand in one year, some said. But what were
these butcheries of the Spaniards but human sacrifices, of more than
six times sixty thousand in one year! Behold them as they file along
the causeway, the very sun striking black and stifling on their famine-
stricken forms and agonized faces. On them, then, ye conquerors!
Complete your work; for in its swift continuance is their earliest rest!
[1228]

The 14th of August the troops entered the surrendered quarters


to review their work and its results. “I swear,” writes Bernal Diaz,
“that the lake and houses and abodes were so full of bodies and
heads of dead men that I am unable to convey an idea thereof; for in
the streets and courts of Tlatelulco there were no other things, and
we could walk only amidst dead bodies.”[1229] Many became sick
from the stench, and Cortés ordered fires to be lighted to purify the
air. Natives were sent to bring forth the dead, and with them went
Spaniards seeking for gold, silver, precious stones, and plumage,
leaving textile fabrics and other less valued effects to the allies; but
the quantity known to have been obtained fell far below their
extravagant expectations, and in their disappointment the soldiers
searched the persons of fugitives, looking into their very mouths for
hidden gold, says a native record. Bernal Diaz complains that the
brigantine crews had already plundered the wealthiest persons, who
were in the canoes, and had sacked the treasure-houses while the
others were fighting. They in their turn affirmed that the Mexicans
had cast their treasures into the lake. The mysterious depths harbor
many secrets, and beneath the waters, round the famed city of the
Aztecs, tradition still places glittering deposits of untold extent.
Three or four days after the fall, Cortés passed over to
Coyuhuacan with the greater part of his forces, there more formally
to celebrate the end of the siege in banqueting and thanksgiving. A
feature of the performance was a solemn procession by all the
soldiers, bareheaded, with banners, raising their voices in praise to
God, who had given them the victory, and who was so soon to be
worshipped from gulf to southern sea.[1230]
The services of the allies being at present no longer needed,
Cortés assembled them to speak farewell. He dwelt in flattering
terms on their brave and effective deeds. He promised they should
be duly represented to his majesty, who would reward them with
singular privileges. To the chiefs were then given shields, robes, and
other articles, with promises of more lands and vassals. Then they
went their way, happy in their slaves and spoils, happy in the thought
of humbled foe, happy in the promises of the Spaniards; they did not
know, poor simpletons, that all along the days and nights of this
terrible siege, with sword and lance on Aztec breast, they had been
forging their own fetters, which they and their children long must
wear.[1231]
The conquest of Mexico was less a subjugation by Spanish
soldiers than their skilful manœuvring of New World forces against
one another. Had Anáhuac been united it would have succumbed
less readily, perhaps never. As it was, while the native nations were
slaying each other, fighting out their ancient feuds, the astute
Spaniards laid their all-possessing hand upon the country.
Nor was any apology on their part needed before Christendom.
Mankind to this day have not become so humane and just as not to
find excuse for any wrong within the realms of strength and
inclination. What then could be expected of an age and nation
wherein it was not uncommon to cloak crime under the fair garb of
religion. Hitherto came the Spaniards to murder and to rob: to rob
and murder in the name of charity and sweet heaven. No excuses
were necessary, however convenient to that end came the appeals
of the Cempoalans groaning under terrible oppression at the hand of
a race delighting in blood and extortion; a race which within two
centuries had risen from a degrading servitude largely by means of
intrigue and treachery; a race stamped with ignoble characteristics
born of serfdom, and eager to retaliate on others for their past
humiliation, yet energetic, enterprising, and advancing with rapid
strides along the pathway of indigenous culture. Ambitious to rule,
they sent their armies to bring province after province under the
yoke. Rapacious collectors followed to press the substance out of
the people, for the appetite of themselves and their masters.
Confiscation, enslavement, and desolation marched in the train, and
the fairest hopes of the land were dragged away in bondage, and to
bleed on the stone of sacrifice.
To all these appalling evils the Totonacs, among others, were
exposed, when soldiers appeared on their shores bearing aloft the
symbol of charity, of deliverance. The crushed family appealed to
them, also the writhing slaves, for from the altars of hideous idols
rose the dying shrieks of youths and maidens. But a short time
before knights of different orders swarmed over Europe, the
professed champions of the oppressed; and the spirit of the
crusaders still lingered in Spain, in form if nothing more; and what
Christian soldier could unheedingly view such outrages!
Montezuma and his people were inhuman monsters, and
Grotius, Montesquieu, and others who should know, say that war in

You might also like