SlideShare a Scribd company logo
1 of 10
Download to read offline
Sundarapandian et al. (Eds): CoNeCo,WiMo, NLP, CRYPSIS, ICAIT, ICDIP, ITCSE, CS & IT 07,
pp. 463–472, 2012. © CS & IT-CSCP 2012 DOI : 10.5121/csit.2012.2445
SECURED TEXT MESSAGE TRANSMISSION
WITH IMPLEMENTATION OF
CONCATENATED CFB CRYPTOGRAPHIC
ALGORITHM
Dr.S.Saravana Kumar1
, Ms R.Dharani2
, Aniruth Sabapathy3
, D.Nirmaldas4
,
S.Srikanth5
ABSTRACT
In the present simulated system, text message transmission has been secured with concatenated
implementation of Cipher Feedback(CFB) cryptographic algorithm. It is anticipated from the numerical
results that the pre-ZF channel equalization based MIMO OFDM wireless communication
system outperforms in QAM digital modulation and BCH channel coding under AWGN and
Raleigh fading channels .In Pre-MMSE/pre-ZF channel equalization scheme, the system shows
comparatively worst performance in convolutional channel coding scheme with QAM/QPSK digital
modulation. It has been observed from the present study that the system performance deteriorates with
increase in noise power as compared to signal power. study of a secured MIMO Orthogonal
Frequency-Division Multiplexing wireless communication system with implementation of two pre
channel equalization techniques such as Pre-Minimum Mean Square Error (Pre-MMSE) and Pre-
Zero Forcing(Pre-ZF)under QPSK and QAM digital modulations.
KEYWORDS
MIMO-OFDM, Pre-MMSE, Pre-ZF, ECB and CFB cryptographic algorithm, Bit Error rate(BER),
AWGN and Raleigh fading channels.
1. INTRODUCTION
Multiple-Input, Multiple-Output (MIMO) technique using multiple antennas at both the transmit
and receive ends has become one of the most important paradigms for the deployment of
existing and emerging wireless communications systems. MIMO constitutes a cost effective
approach to high-throughput wireless communications. MIMOs are capable of supporting
significantly higher data rates than the Universal Mobile Telecommunications System (UMTS)
and the High-Speed Downlink Packet Access (HSDPA) based 3G networks. MIMO
OFDM(Orthogonal Frequency-Division Multiplexing) communication systems have shown
increased capacity, coverage and achievable reliability with the aid of MIMO techniques. The
OFDM has emerged as a successful air-interface multicarrier digital modulation technique
advocated by many European standards, such as Digital Audio Broadcasting (DAB), Digital
Video Broadcasting for Terrestrial television (DVB-T), Digital Video Broadcasting for
Handheld terminals (DVB-H) , Wireless Local Area Networks (WLANs) and Broadband Radio
464 Computer Science & Information Technology ( CS & IT )
Access Networks (BRANs).Hi
including WiMAX and LTE, a
spectral efficiency and performa
becomes possible to increase pe
systems. The MIMO based OF
significantly higher bit rates. The
OFDM with higher order ada
techniques[1-3].
2. MATHEMATICAL MODEL
In our presently considered
communication system, various
(ECB) and Cipher Feedback
description is given below.
2.1. Pre-Channel Equalizati
In pre channel equalization sch
matrix in complex form(W ∈ C2
vector x ∈ C2 x 1 can be expre
is the original symbol vector for transmission. In case of
employment, the corresponding weight matrix (assuming that the channel
given as
Where β is a constant to meet the
is given with two transmitting a
To compensate for the effect of
signal must be divided by b vi
signal y is given by
Computer Science & Information Technology ( CS & IT )
igh-speed cellular and WLAN standards (i.e.,
and 802.11a,g,n) have migrated to OFDM, which
ance With MIMO signal processing and wider band
eak bit rates to the range of 100 Mb/s in both LTE
FDM technologies have been used in WLAN system
The 802.11n standard has a peak bit rate of 300
aptive modulation and MIMO along with mult
ODEL
d secured spatially multiplexed MIMO OFD
ous Pre channel equalization schemes, Electroni
(CFB) cryptographic algorithms have been use
ion
heme, pre equalization is represented by a pre-equ
C2 x 2) and the precoded digitally modulated comp
ressed as
tor for transmission. In case of zero-forcing (ZF) equalization
employment, the corresponding weight matrix (assuming that the channel matrix H issquare) is
he total transmitted power constraint after pre-equali
antenna(NT=2) as
of amplification by a factor of β at the transmitter,
ia automatic gain control (AGC) at the receiver, The
., 4G cellular
offers higher
nd channels, it
and WiMAX
ms to achieve
00 Mb/s using
tiple channel
DM wireless
ic Codebook
sed. A brief
ualizer weight
omplex symbol
(1)
forcing (ZF) equalization
matrix H issquare) is
(2)
lization and it
(3)
, the received
The received
(4)
Computer Science & Information Technology ( CS & IT )
Other than ZF pre-equalization,
theweight matrix is given as
Where, the constant β is used ag
It is calculated by Equation (3) r
equalization scheme on the tra
attributed to the fact that the rece
course of equalization[4].
2.2. Cryptographic algorithm
Cryptography is synonymous with encryption and used exclusively on providing confidentiality
of messages. With the advancement of information technology, a great emphasis has been gi
to provide confidentiality, integrity and
Symmetric Key Cryptography, there are two types of symmetric key cipher; namely, stream
ciphers and block ciphers. With stream ciphers, data is encrypted one digit (bit or byte) at a time.
Stream ciphers approximate one
block cipher processes fixed-length groups of bits. A block of plaintext symbols are encrypted to
create a block ciphertext of the same size [6].
The most widely used encryption scheme is based on the Data E
adopted in 1977 by the National Bureau of Standards. The DES scheme is essentially a block
cipher technique that uses certainnumber of bit blocks. In Electronic Codebook (ECB) block
cipher cryptographic scheme, we have divided the
64 bits. Each block of plaintext is encrypted using the same key of size 64 bits. In Cipher
Feedback (CFB) cryptographic scheme, the input is processed with64 bits at a time. Preceding
ciphertext is used as input to the encryption algorithm to produce pseudorandom output, which is
XORed with plaintext to produce next unit of ciphertext [7].
3. COMMUNICATION SYSTEM
A simulated single -user 2 x 2 spatially multiplexed MIMO OFDM wireless communication
system as depicted in Figure 1 utilizes two pre channel equalization schemes.In such a
communication system, the text message is encrypted doubly with concatenation of
Codebook (ECB) and Cipher Feedback ( CFB) cryptographic algorithm. The encrypted text
message is channel encoded using each of the three channel coding scheme ( ½
convolutional, CRC an BCH) and interleaved for minimization o
bits are digitally modulated using two types of digital modulations such as Quadrature Phase Shift
Keying (QPSK) and Quadrature Amplitude (QAM) [8,9]. The complex digitally
modulated symbols are spatially m
(STBC), an efficient transmit diversity scheme [10]. The outputs of
Computer Science & Information Technology ( CS & IT )
on, MMSE pre-equalization can also be used. I
gain to meet up the total transmitted power constrain
replacing with . It is noted
ansmitter side outperforms the receiver-side equa
eceiver-side equalization suffers from noise enhanc
2.2. Cryptographic algorithm
synonymous with encryption and used exclusively on providing confidentiality
of messages. With the advancement of information technology, a great emphasis has been gi
fidentiality, integrity and authentication for secured data transmission. In
Symmetric Key Cryptography, there are two types of symmetric key cipher; namely, stream
ciphers and block ciphers. With stream ciphers, data is encrypted one digit (bit or byte) at a time.
Stream ciphers approximate one-time pad ciphers (also known as Vernam ciphers). In contrast, a
length groups of bits. A block of plaintext symbols are encrypted to
create a block ciphertext of the same size [6].
The most widely used encryption scheme is based on the Data Encryption Standard (DES)
adopted in 1977 by the National Bureau of Standards. The DES scheme is essentially a block
cipher technique that uses certainnumber of bit blocks. In Electronic Codebook (ECB) block
cipher cryptographic scheme, we have divided the whole message into several blocks of each size
64 bits. Each block of plaintext is encrypted using the same key of size 64 bits. In Cipher
Feedback (CFB) cryptographic scheme, the input is processed with64 bits at a time. Preceding
input to the encryption algorithm to produce pseudorandom output, which is
XORed with plaintext to produce next unit of ciphertext [7].
YSTEM MODEL
user 2 x 2 spatially multiplexed MIMO OFDM wireless communication
system as depicted in Figure 1 utilizes two pre channel equalization schemes.In such a
communication system, the text message is encrypted doubly with concatenation of
Codebook (ECB) and Cipher Feedback ( CFB) cryptographic algorithm. The encrypted text
message is channel encoded using each of the three channel coding scheme ( ½
convolutional, CRC an BCH) and interleaved for minimization of burst errors. The interleaved
bits are digitally modulated using two types of digital modulations such as Quadrature Phase Shift
Keying (QPSK) and Quadrature Amplitude (QAM) [8,9]. The complex digitally
modulated symbols are spatially multiplexed using Alamouti’s space –time block coding
it diversity scheme [10]. The outputs of the Space-
465
In this case,
(5)
nt.
d that the pre-
alization. It is
cement in the
synonymous with encryption and used exclusively on providing confidentiality
of messages. With the advancement of information technology, a great emphasis has been given
transmission. In
Symmetric Key Cryptography, there are two types of symmetric key cipher; namely, stream
ciphers and block ciphers. With stream ciphers, data is encrypted one digit (bit or byte) at a time.
also known as Vernam ciphers). In contrast, a
length groups of bits. A block of plaintext symbols are encrypted to
ncryption Standard (DES)
adopted in 1977 by the National Bureau of Standards. The DES scheme is essentially a block
cipher technique that uses certainnumber of bit blocks. In Electronic Codebook (ECB) block
whole message into several blocks of each size
64 bits. Each block of plaintext is encrypted using the same key of size 64 bits. In Cipher-
Feedback (CFB) cryptographic scheme, the input is processed with64 bits at a time. Preceding
input to the encryption algorithm to produce pseudorandom output, which is
user 2 x 2 spatially multiplexed MIMO OFDM wireless communication
system as depicted in Figure 1 utilizes two pre channel equalization schemes.In such a
communication system, the text message is encrypted doubly with concatenation of Electronic
Codebook (ECB) and Cipher Feedback ( CFB) cryptographic algorithm. The encrypted text
message is channel encoded using each of the three channel coding scheme ( ½-rated
f burst errors. The interleaved
bits are digitally modulated using two types of digital modulations such as Quadrature Phase Shift
Keying (QPSK) and Quadrature Amplitude (QAM) [8,9]. The complex digitally
time block coding
- time block
466 Computer Science & Information Technology ( CS & IT )
encoder are sent up into two serial to parallel converter. The serial to parallely (S/P) converted
complex data symbols are fed into each of the two OFDM modulator with 1024 sub carriers
which performs an IFFT on each OFDM block of length 1024 followed by a parallel –to- serial
conversion. A cyclic prefix (CP) of length Lcp (0.1*1024) containing a copy of the last Lcp
samples of the parallel –to- serial converted output of the 1024-point IFFT is then prepended. The
CP is essentially a guard interval which serves to eliminate interference between OFDM symbols.
Figure 1: Block diagram of a Pre-Channel Equalization based secured MIMO OFDM wireless
communication system
However, the resulting OFDM symbols of length 1024+ Lcp are weighted with pre equalization
channel coefficients prior to lunching from the two transmitting antenna. In case of post channel
equalization, no pre-channel equalization operation is performed. However, in receiving section,
the signals are detected and passed through automatic gain controlling section to compensate the
effect of amplification at the transmitter. The detected signals are subsequently sent up to the
serial to parallel (S/P) converter and fed into OFDM demodulator which performs FFT operation
on each OFDM block. The FFT operated OFDM blocked signal are processed with cyclic prefix
removing scheme and are undergone from parallel to serial conversion and are fed into Space
time block decoder. Its output in complex symbols are digitally demodulated, deinterleaved,
channel decoded and decrypted doubly to recover the transmitted text message.
Computer Science & Information Technology ( CS & IT ) 467
4. RESULT AND DISCUSSION
The present simulation based study has been made for MIMO OFDM wireless communication
system in consideration with various parameters presented in Table 1.
Table 1: Summary of the simulated model parameters
Text message(Converted into
bits)
1024
Channel Coding ½-rated Convolutional, CRC and BCH Channel
EncodingModulation QPSK and QAM
No of OFDM sub-carriers 1024
Cryptographic algorithm Electronic Codebook(ECB) and Cipher Feedback(CFB)
Channel Equalization Scheme Pre-Mean Square error (Pre-MMSE) and Pre-Zero-
Forcing (Pre-ZF)
CP length 103 symbols
Channel AWGN and Rayleigh
Signal to noise ratio, SNR 0 to10 dB
We have conducted computer simulations to observe the impact of pre and post channel
equalization schemes on the BER performance of the secured MIMO OFDM wireless
communication system based on the parameters given in Table 1. It is assumed that the channel
state information (CSI) is available at the transmitter side and the fading process is
approximately constant during one OFDM block length.
The graphical illustrations presented in Figure 2 through Figure 5 show system performance
comparison with implementation of pre-MMSE and pre-ZF based Channel equalization schemes
under QPSK and QAM digital modulations. In all cases, it is noticeable that Pre-ZF based
channel equalization with BCH channel coding schemes improves the system performance. In
Figure 2, it is observable that the system performance is well discriminable less than three
different channel coding schemes. For a typically assumed SNR value of 2 dB, the BER values
are 0.4609 and 0.2485 in case of Convolutional and BCH channel coding schemes under QPSK
and Pre-MMSE and viz., the system achieves a gain of 2.68 dB in BCH as compared to ½-rated
Convolutional. The system shows well defined performance over a large examined SNR values
under the situation of three channel coding schemes and QAM and Pre- MMSE (Figure 3). At a
SNR value of 2 dB, the system performance is improved by 3.15dB for BER values of 0.1673
and 0.3454 in case of BCH as compared to ½-rated Convolutional.
468 Computer Science & Information Technology ( CS & IT )
Figure 2 : BER Performance of a secured MIMO OFDM wireless communication with
implementation of different Channel coding, Pre-MMSE channel equalization and QPSK digital
modulation schemes.
Figure 3 : BER Performance of a secured MIMO OFDM wireless communication with
implementation of different Channel coding, Pre-MMSE channel equalization and QAM digital
modulation schemes.
In Figure 4, and Figure 5, it is observable that the rate of system performance improvement with
increase in SNR values. is comparatively higher in Convolutional coding as compared to CRC
and BCH. In Figure 4 and Figure 5, the system performance improvement is found to have
values of 2.76dB (BERs: 0.2363 and 0.4461) and 3.40dB(BERs: 0.1565 and 0.3425) at a
typically assumed SNR value of 2 dB in case of most satisfactory and worst
system performance.
Computer Science & Information Technology ( CS & IT ) 469
Figure 4 : BER Performance of a secured MIMO OFDM wireless communication with
implementation of different Channel coding, Pre-ZF channel equalization and QPSK digital
modulation schemes.
Figure 5 : BER Performance of a secured MIMO OFDM wireless communication with
implementation of different Channel coding, Pre-ZF channel equalization and QAM digital
modulation schemes.
In Figure 6, a BER comparison has been made for the system in identical channel coding and
different digital modulation and pre-channel equalization schemes. It is remarkable that over a
significant SNR value area, the system shows quite satisfactory performance in QAM, Pre-ZF
and BCH schemes. Under identical implementation of channel coding (BCH) scheme, the
system shows worst performance in QPSK and Pre-MMSE. Asystem performance improvement
of 2.01 dB is achieved at SNR value of 2dB in QAM, Pre-ZF and BCH schemes as
compared to QAM, Pre-MMSE and BCH(BERs: 0.1565 and 0.2485).
470 Computer Science & Information Technology ( CS & IT )
Figure 6 : BER Performance Comparison of the MIMO OFDM wireless communication
system for different Pre channel equalization and digital modulation schemes under BCH
channel coding scheme.
In Figure 7, the transmitted, doubly encrypted and retrieved text messages at 4dB and 6dB have
been presented under implementation of QAM, Pre-ZF and BCH channel coding schemes. The
estimated BER values are found to have values of 0.0166 and 0.000.
Multiple-input multiple-output systems have attracted considerable attention due to the linear
growth of the system capacity.
(a)
_Íjz¶9ãx ¼Bù_Á¨ùN£|×óù >nq½a ydy(_ôj?¬ sùêüß) b É6õ19êxß 7ÙA¢ Ïj
u&êZ
yQØÀa_jò°,êZßIV+ $#`?o ð×B·
(b)
Multiple-input multipLeoõôx}ô óystemshave attracted considerable
attention due to the linear growth of the system0s1`!cmpy.
(c)
Multiple-input multiple-output systems have attracted considerable
attention due to the linear growth of the system capacity.
(d)
Figure 7 : Presented text message in various forms in a MIMO OFDM wireless communication
system , (a) Transmitted, (b) Doubly Encrypted (c) Retrieved message at 4 dB (d) Retrieved
message at 6 dB. Red marks indicate noise contamination
Computer Science & Information Technology ( CS & IT ) 471
5. CONCLUSIONS
In our present study, we have studied the performance of a Convolutionally encoded 2 x 2
spatially multiplexed MIMO-OFDM wireless communication system adopting various digital
modulations, channel coding and Pre channel Equalization schemes. A range of system
performance results highlights the impact of a simplified digital modulation, Pre channel
Equalization (signal detection) and channel coding techniques. In the context of system
performance, it can be concluded that the implementation of QAM digital modulation technique
with implemented Pre-ZF channel equalization and BCH channel coding schemes in FEC
encoded MIMO-OFDM wireless communication system provides satisfactory performance in
retrieving the transmitted message of the sender.
REFERENCES
[1] LajosHanzo, YosefAkhtman, Li Wang and Ming Jiang, (2011), " MIMO-OFDM for LTE, Wi-Fi and
WiMAX , Coherent versus Non-coherent and Cooperative Turbo-transceivers", John Wiley and
Sons, Ltd, United Kingdom.
[2] DipankarRaychaudhuri and Narayan B. Mandayam ,(2012), " Frontiers of Wireless and Mobile
Communications" , Proceedings of the IEEE vol. 100, no. 4, pp. 828-840.
[3] Alain Sibille, Claude Oestges and Alberto Zanella, (2011), "MIMO From Theory to
Implementation" , Elsevier Inc., United Kingdom
[4] Yong Soo Cho, Jaekwon Kim, Won Young Yang, Chung G. Kang, (2010), "MIMO-OFDM
Wireless Communications with MATLAB", John Wiley and Sons (Asia) Pte Limited, Singapore.
[5] Lin BaiandJinho Choi(2012), "Low Complexity MIMO Detection", Springer Science and Business
Media, LLC ,New York, USA
[6] Alan Holt and Chi-Yu Huang (2010), "802.11 Wireless Networks Security and Analysis",
Springer-Verlag London Limited, New York.
[7] William Stallings(2005),"Cryptography and Network Security Principles and Practices", Fourth
Edition, Prentice Hall Publisher.
[8] Theodore S Rappaport(2001) Wireless Communications: Principles and Practice, Second Edition,
Prentice Hall, Upper Saddle River, New Jersey, USA
[9] Goldsmith, Andrea, 2005 :Wireless Communications, First Edition, Cambridge University
Press,United Kingdom
[10] Siavash M. Alamouti (1998), A Simple Transmit Diversity Technique For Wireless Communications,
IEEE Journal on Select areas in Communications, vol.16, no.8, pp.1451-1458
472 Computer Science & Information Technology ( CS & IT )
AUTHORS
Dr S.SARAVANAKUMAR has more than 10 years of teaching and research
experience. He did his Postgraduate in ME in Computer Science and Engineering at
Bharath engineering college, Chennai, and PhD in Computer Science and Engineering at
Bharath University, Chennai. He
Lecturer, Assistant Professor and Associate Professor and HOD. He has published
more than 35 research papers in High Impact factor International Journal,
National and International conferences a
Bangkok and Singapore. He has guiding a number of research scholars in the area
Adhoc Network, ANN, Security in Sensor Networks, Mobile Database and Data Mining under Bharath
University Chennai, Sathayabama Universit
Ms. R. Dharani has more than 8 years of teaching experience. She has occupied various
positions as Lecturer, Senior Lecturer, Assistant Professor (Grade
more than 25 research papers in High Impact fac
International conferences and visited many countries like Taiwan, Bangkok and
Singapore. He has guiding a number of research scholars in the area Adhoc
Network, ANN, Security in Sensor Networks, Mobi
Bharath University Chennai, Sathayabama University and Bharathiyar University.
G. Aniruth Sabapathy is a final year student pursuing his B.tech Information
Technology, Panimalar institute of
conferences and National level
computing, peer to peer systems and s
are Database management and systems,
optimization. He has created a search engine optimization website
(www.directionswitch.com).
Nirmal das.D is a final year student pursuing his B.Tech Information Technology,
in Panimalar institute of technology, Chennai. He has attended several conferences
and National level symposium. He has submitted papers on peer to peer systems
and search engine optimization. His domain of Interest in the area Adhoc Network,
ANN, Security in Sensor Networks, Mobile Database and Data Mining.
S.Srikanth is a final year student pursuing his B.Tech Information Technology, in
Panimalar institute of technology, Chennai. He has attended several conferences and
National level symposium. He has submitted pa
systems and search engine optimization. His domain of Interest are Database
management and systems, web technology, web designing, search engine optimization
Computer Science & Information Technology ( CS & IT )
has more than 10 years of teaching and research
experience. He did his Postgraduate in ME in Computer Science and Engineering at
Bharath engineering college, Chennai, and PhD in Computer Science and Engineering at
Bharath University, Chennai. He occupied various positions as Lecturer, Senior
Lecturer, Assistant Professor and Associate Professor and HOD. He has published
more than 35 research papers in High Impact factor International Journal,
National and International conferences and visited many countries like Taiwan,
Bangkok and Singapore. He has guiding a number of research scholars in the area
Adhoc Network, ANN, Security in Sensor Networks, Mobile Database and Data Mining under Bharath
University Chennai, Sathayabama University and Bharathiyar University.
has more than 8 years of teaching experience. She has occupied various
positions as Lecturer, Senior Lecturer, Assistant Professor (Grade-I) . She has published
more than 25 research papers in High Impact factor International Journal, National and
International conferences and visited many countries like Taiwan, Bangkok and
Singapore. He has guiding a number of research scholars in the area Adhoc
Network, ANN, Security in Sensor Networks, Mobile Database and Data Mining under
Bharath University Chennai, Sathayabama University and Bharathiyar University.
final year student pursuing his B.tech Information
Panimalar institute of technology, Chennai. He has attended several
National level symposium. He has submitted papers on cloud
peer to peer systems and search engine optimization. His domain of Interest
are Database management and systems, web technology, web designing, search engine
created a search engine optimization website
Nirmal das.D is a final year student pursuing his B.Tech Information Technology,
hnology, Chennai. He has attended several conferences
and National level symposium. He has submitted papers on peer to peer systems
and search engine optimization. His domain of Interest in the area Adhoc Network,
etworks, Mobile Database and Data Mining.
S.Srikanth is a final year student pursuing his B.Tech Information Technology, in
Panimalar institute of technology, Chennai. He has attended several conferences and
National level symposium. He has submitted papers on cloud computing, peer to peer
systems and search engine optimization. His domain of Interest are Database
management and systems, web technology, web designing, search engine optimization
Adhoc Network, ANN, Security in Sensor Networks, Mobile Database and Data Mining under Bharath

More Related Content

What's hot

Study of the operational SNR while constructing polar codes
Study of the operational SNR while constructing polar codes Study of the operational SNR while constructing polar codes
Study of the operational SNR while constructing polar codes IJECEIAES
 
Multi user performance on mc cdma single relay cooperative system by distribu...
Multi user performance on mc cdma single relay cooperative system by distribu...Multi user performance on mc cdma single relay cooperative system by distribu...
Multi user performance on mc cdma single relay cooperative system by distribu...IJCNCJournal
 
MartinDickThesis
MartinDickThesisMartinDickThesis
MartinDickThesisMartin Dick
 
Ijetae 0913 79
Ijetae 0913 79Ijetae 0913 79
Ijetae 0913 79Usman Ali
 
Data detection with a progressive parallel ici canceller in mimo ofdm
Data detection with a progressive parallel ici canceller in mimo ofdmData detection with a progressive parallel ici canceller in mimo ofdm
Data detection with a progressive parallel ici canceller in mimo ofdmeSAT Publishing House
 
Capsulization of Existing Space Time Techniques
Capsulization of Existing Space Time TechniquesCapsulization of Existing Space Time Techniques
Capsulization of Existing Space Time TechniquesIJEEE
 
Channel Estimation In The STTC For OFDM Using MIMO With 4G System
Channel Estimation In The STTC For OFDM Using MIMO With 4G SystemChannel Estimation In The STTC For OFDM Using MIMO With 4G System
Channel Estimation In The STTC For OFDM Using MIMO With 4G SystemIOSR Journals
 
Improvement of MFSK -BER Performance Using MIMO Technology on Multipath Non L...
Improvement of MFSK -BER Performance Using MIMO Technology on Multipath Non L...Improvement of MFSK -BER Performance Using MIMO Technology on Multipath Non L...
Improvement of MFSK -BER Performance Using MIMO Technology on Multipath Non L...theijes
 
A Potent MIMO–OFDM System Designed for Optimum BER and its Performance Anal...
A Potent MIMO–OFDM System Designed for Optimum BER and its Performance Anal...A Potent MIMO–OFDM System Designed for Optimum BER and its Performance Anal...
A Potent MIMO–OFDM System Designed for Optimum BER and its Performance Anal...inventionjournals
 

What's hot (17)

50120140503006 2-3
50120140503006 2-350120140503006 2-3
50120140503006 2-3
 
Study of the operational SNR while constructing polar codes
Study of the operational SNR while constructing polar codes Study of the operational SNR while constructing polar codes
Study of the operational SNR while constructing polar codes
 
50120140503006
5012014050300650120140503006
50120140503006
 
Multi user performance on mc cdma single relay cooperative system by distribu...
Multi user performance on mc cdma single relay cooperative system by distribu...Multi user performance on mc cdma single relay cooperative system by distribu...
Multi user performance on mc cdma single relay cooperative system by distribu...
 
E213152
E213152E213152
E213152
 
5 G Numerology
5 G Numerology5 G Numerology
5 G Numerology
 
At34278282
At34278282At34278282
At34278282
 
MartinDickThesis
MartinDickThesisMartinDickThesis
MartinDickThesis
 
Ijetae 0913 79
Ijetae 0913 79Ijetae 0913 79
Ijetae 0913 79
 
Data detection with a progressive parallel ici canceller in mimo ofdm
Data detection with a progressive parallel ici canceller in mimo ofdmData detection with a progressive parallel ici canceller in mimo ofdm
Data detection with a progressive parallel ici canceller in mimo ofdm
 
Capsulization of Existing Space Time Techniques
Capsulization of Existing Space Time TechniquesCapsulization of Existing Space Time Techniques
Capsulization of Existing Space Time Techniques
 
Channel Estimation In The STTC For OFDM Using MIMO With 4G System
Channel Estimation In The STTC For OFDM Using MIMO With 4G SystemChannel Estimation In The STTC For OFDM Using MIMO With 4G System
Channel Estimation In The STTC For OFDM Using MIMO With 4G System
 
Improvement of MFSK -BER Performance Using MIMO Technology on Multipath Non L...
Improvement of MFSK -BER Performance Using MIMO Technology on Multipath Non L...Improvement of MFSK -BER Performance Using MIMO Technology on Multipath Non L...
Improvement of MFSK -BER Performance Using MIMO Technology on Multipath Non L...
 
Network coding
Network codingNetwork coding
Network coding
 
MC-cdma
MC-cdmaMC-cdma
MC-cdma
 
A Potent MIMO–OFDM System Designed for Optimum BER and its Performance Anal...
A Potent MIMO–OFDM System Designed for Optimum BER and its Performance Anal...A Potent MIMO–OFDM System Designed for Optimum BER and its Performance Anal...
A Potent MIMO–OFDM System Designed for Optimum BER and its Performance Anal...
 
B0210714
B0210714B0210714
B0210714
 

Similar to SECURED TEXT MESSAGE TRANSMISSION WITH IMPLEMENTATION OF CONCATENATED CFB CRYPTOGRAPHIC ALGORITHM

Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...pijans
 
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...pijans
 
COMPARATIVE PERFORMANCE ASSESSMENT OF V- BLAST ENCODED 8×8 MIMO MC-CDMA WIREL...
COMPARATIVE PERFORMANCE ASSESSMENT OF V- BLAST ENCODED 8×8 MIMO MC-CDMA WIREL...COMPARATIVE PERFORMANCE ASSESSMENT OF V- BLAST ENCODED 8×8 MIMO MC-CDMA WIREL...
COMPARATIVE PERFORMANCE ASSESSMENT OF V- BLAST ENCODED 8×8 MIMO MC-CDMA WIREL...pijans
 
IMPLEMENTATION OF JOINT NETWORK CHANNEL DECODING ALGORITHM FOR MULTIPLE ACCES...
IMPLEMENTATION OF JOINT NETWORK CHANNEL DECODING ALGORITHM FOR MULTIPLE ACCES...IMPLEMENTATION OF JOINT NETWORK CHANNEL DECODING ALGORITHM FOR MULTIPLE ACCES...
IMPLEMENTATION OF JOINT NETWORK CHANNEL DECODING ALGORITHM FOR MULTIPLE ACCES...cscpconf
 
Implementation of Joint Network Channel Decoding Algorithm for Multiple Acces...
Implementation of Joint Network Channel Decoding Algorithm for Multiple Acces...Implementation of Joint Network Channel Decoding Algorithm for Multiple Acces...
Implementation of Joint Network Channel Decoding Algorithm for Multiple Acces...csandit
 
MC CDMA PERFORMANCE ON SINGLE RELAY COOPERATIVE SYSTEM BY DIVERSITY TECHNIQUE...
MC CDMA PERFORMANCE ON SINGLE RELAY COOPERATIVE SYSTEM BY DIVERSITY TECHNIQUE...MC CDMA PERFORMANCE ON SINGLE RELAY COOPERATIVE SYSTEM BY DIVERSITY TECHNIQUE...
MC CDMA PERFORMANCE ON SINGLE RELAY COOPERATIVE SYSTEM BY DIVERSITY TECHNIQUE...cscpconf
 
Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers
Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers  Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers
Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers IJECEIAES
 
A New Bit Split and Interleaved Channel Coding for MIMO Decoder
A New Bit Split and Interleaved Channel Coding for MIMO DecoderA New Bit Split and Interleaved Channel Coding for MIMO Decoder
A New Bit Split and Interleaved Channel Coding for MIMO DecoderIJARBEST JOURNAL
 
Error Control and performance Analysis of MIMO-OFDM Over Fading Channels
Error Control and performance Analysis of MIMO-OFDM Over Fading ChannelsError Control and performance Analysis of MIMO-OFDM Over Fading Channels
Error Control and performance Analysis of MIMO-OFDM Over Fading ChannelsIOSR Journals
 
Bandwidth aware fec algorithms for wireless communication systems
Bandwidth aware fec algorithms for wireless communication systemsBandwidth aware fec algorithms for wireless communication systems
Bandwidth aware fec algorithms for wireless communication systemsAlexander Decker
 
BLOCK CODES,STBCs & STTCs.pptx
BLOCK CODES,STBCs & STTCs.pptxBLOCK CODES,STBCs & STTCs.pptx
BLOCK CODES,STBCs & STTCs.pptxFAIZAN SHAFI
 
Chaos Encryption and Coding for Image Transmission over Noisy Channels
Chaos Encryption and Coding for Image Transmission over Noisy ChannelsChaos Encryption and Coding for Image Transmission over Noisy Channels
Chaos Encryption and Coding for Image Transmission over Noisy Channelsiosrjce
 
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...IJCSEIT Journal
 
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgnIaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgnIaetsd Iaetsd
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

Similar to SECURED TEXT MESSAGE TRANSMISSION WITH IMPLEMENTATION OF CONCATENATED CFB CRYPTOGRAPHIC ALGORITHM (20)

Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
Comparative Performance Assessment of V-Blast Encoded 8×8 MIMO MC-CDMA Wirele...
 
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
 
COMPARATIVE PERFORMANCE ASSESSMENT OF V- BLAST ENCODED 8×8 MIMO MC-CDMA WIREL...
COMPARATIVE PERFORMANCE ASSESSMENT OF V- BLAST ENCODED 8×8 MIMO MC-CDMA WIREL...COMPARATIVE PERFORMANCE ASSESSMENT OF V- BLAST ENCODED 8×8 MIMO MC-CDMA WIREL...
COMPARATIVE PERFORMANCE ASSESSMENT OF V- BLAST ENCODED 8×8 MIMO MC-CDMA WIREL...
 
IMPLEMENTATION OF JOINT NETWORK CHANNEL DECODING ALGORITHM FOR MULTIPLE ACCES...
IMPLEMENTATION OF JOINT NETWORK CHANNEL DECODING ALGORITHM FOR MULTIPLE ACCES...IMPLEMENTATION OF JOINT NETWORK CHANNEL DECODING ALGORITHM FOR MULTIPLE ACCES...
IMPLEMENTATION OF JOINT NETWORK CHANNEL DECODING ALGORITHM FOR MULTIPLE ACCES...
 
Implementation of Joint Network Channel Decoding Algorithm for Multiple Acces...
Implementation of Joint Network Channel Decoding Algorithm for Multiple Acces...Implementation of Joint Network Channel Decoding Algorithm for Multiple Acces...
Implementation of Joint Network Channel Decoding Algorithm for Multiple Acces...
 
MC CDMA PERFORMANCE ON SINGLE RELAY COOPERATIVE SYSTEM BY DIVERSITY TECHNIQUE...
MC CDMA PERFORMANCE ON SINGLE RELAY COOPERATIVE SYSTEM BY DIVERSITY TECHNIQUE...MC CDMA PERFORMANCE ON SINGLE RELAY COOPERATIVE SYSTEM BY DIVERSITY TECHNIQUE...
MC CDMA PERFORMANCE ON SINGLE RELAY COOPERATIVE SYSTEM BY DIVERSITY TECHNIQUE...
 
Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers
Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers  Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers
Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers
 
A New Bit Split and Interleaved Channel Coding for MIMO Decoder
A New Bit Split and Interleaved Channel Coding for MIMO DecoderA New Bit Split and Interleaved Channel Coding for MIMO Decoder
A New Bit Split and Interleaved Channel Coding for MIMO Decoder
 
Error Control and performance Analysis of MIMO-OFDM Over Fading Channels
Error Control and performance Analysis of MIMO-OFDM Over Fading ChannelsError Control and performance Analysis of MIMO-OFDM Over Fading Channels
Error Control and performance Analysis of MIMO-OFDM Over Fading Channels
 
Bandwidth aware fec algorithms for wireless communication systems
Bandwidth aware fec algorithms for wireless communication systemsBandwidth aware fec algorithms for wireless communication systems
Bandwidth aware fec algorithms for wireless communication systems
 
BLOCK CODES,STBCs & STTCs.pptx
BLOCK CODES,STBCs & STTCs.pptxBLOCK CODES,STBCs & STTCs.pptx
BLOCK CODES,STBCs & STTCs.pptx
 
Co35503507
Co35503507Co35503507
Co35503507
 
H017653645
H017653645H017653645
H017653645
 
Chaos Encryption and Coding for Image Transmission over Noisy Channels
Chaos Encryption and Coding for Image Transmission over Noisy ChannelsChaos Encryption and Coding for Image Transmission over Noisy Channels
Chaos Encryption and Coding for Image Transmission over Noisy Channels
 
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
 
Cdma and 3 g
Cdma and 3 gCdma and 3 g
Cdma and 3 g
 
Turbo encoder and decoder chip design and FPGA device analysis for communicat...
Turbo encoder and decoder chip design and FPGA device analysis for communicat...Turbo encoder and decoder chip design and FPGA device analysis for communicat...
Turbo encoder and decoder chip design and FPGA device analysis for communicat...
 
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgnIaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
Iaetsd ber performance of cdma, wcdma, ieee802.11g in awgn
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Ff34970973
Ff34970973Ff34970973
Ff34970973
 

More from cscpconf

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR cscpconf
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATIONcscpconf
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...cscpconf
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIEScscpconf
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICcscpconf
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS cscpconf
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS cscpconf
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICcscpconf
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINcscpconf
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...cscpconf
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMcscpconf
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...cscpconf
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWcscpconf
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKcscpconf
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...cscpconf
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAcscpconf
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHcscpconf
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...cscpconf
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGEcscpconf
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTcscpconf
 

More from cscpconf (20)

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR
 
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION
 
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
MOVING FROM WATERFALL TO AGILE PROCESS IN SOFTWARE ENGINEERING CAPSTONE PROJE...
 
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIESPROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
PROMOTING STUDENT ENGAGEMENT USING SOCIAL MEDIA TECHNOLOGIES
 
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGICA SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC
 
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
DYNAMIC PHONE WARPING – A METHOD TO MEASURE THE DISTANCE BETWEEN PRONUNCIATIONS
 
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS
 
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTICTWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC
 
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAINDETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN
 
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING C...
 
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEMIMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
IMPORTANCE OF VERB SUFFIX MAPPING IN DISCOURSE TRANSLATION SYSTEM
 
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
EXACT SOLUTIONS OF A FAMILY OF HIGHER-DIMENSIONAL SPACE-TIME FRACTIONAL KDV-T...
 
AUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEWAUTOMATED PENETRATION TESTING: AN OVERVIEW
AUTOMATED PENETRATION TESTING: AN OVERVIEW
 
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORKCLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
CLASSIFICATION OF ALZHEIMER USING fMRI DATA AND BRAIN NETWORK
 
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
VALIDATION METHOD OF FUZZY ASSOCIATION RULES BASED ON FUZZY FORMAL CONCEPT AN...
 
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATAPROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
PROBABILITY BASED CLUSTER EXPANSION OVERSAMPLING TECHNIQUE FOR IMBALANCED DATA
 
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCHCHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
CHARACTER AND IMAGE RECOGNITION FOR DATA CATALOGING IN ECOLOGICAL RESEARCH
 
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
SOCIAL MEDIA ANALYTICS FOR SENTIMENT ANALYSIS AND EVENT DETECTION IN SMART CI...
 
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGESOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
SOCIAL NETWORK HATE SPEECH DETECTION FOR AMHARIC LANGUAGE
 
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXTGENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
GENERAL REGRESSION NEURAL NETWORK BASED POS TAGGING FOR NEPALI TEXT
 

Recently uploaded

Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

SECURED TEXT MESSAGE TRANSMISSION WITH IMPLEMENTATION OF CONCATENATED CFB CRYPTOGRAPHIC ALGORITHM

  • 1. Sundarapandian et al. (Eds): CoNeCo,WiMo, NLP, CRYPSIS, ICAIT, ICDIP, ITCSE, CS & IT 07, pp. 463–472, 2012. © CS & IT-CSCP 2012 DOI : 10.5121/csit.2012.2445 SECURED TEXT MESSAGE TRANSMISSION WITH IMPLEMENTATION OF CONCATENATED CFB CRYPTOGRAPHIC ALGORITHM Dr.S.Saravana Kumar1 , Ms R.Dharani2 , Aniruth Sabapathy3 , D.Nirmaldas4 , S.Srikanth5 ABSTRACT In the present simulated system, text message transmission has been secured with concatenated implementation of Cipher Feedback(CFB) cryptographic algorithm. It is anticipated from the numerical results that the pre-ZF channel equalization based MIMO OFDM wireless communication system outperforms in QAM digital modulation and BCH channel coding under AWGN and Raleigh fading channels .In Pre-MMSE/pre-ZF channel equalization scheme, the system shows comparatively worst performance in convolutional channel coding scheme with QAM/QPSK digital modulation. It has been observed from the present study that the system performance deteriorates with increase in noise power as compared to signal power. study of a secured MIMO Orthogonal Frequency-Division Multiplexing wireless communication system with implementation of two pre channel equalization techniques such as Pre-Minimum Mean Square Error (Pre-MMSE) and Pre- Zero Forcing(Pre-ZF)under QPSK and QAM digital modulations. KEYWORDS MIMO-OFDM, Pre-MMSE, Pre-ZF, ECB and CFB cryptographic algorithm, Bit Error rate(BER), AWGN and Raleigh fading channels. 1. INTRODUCTION Multiple-Input, Multiple-Output (MIMO) technique using multiple antennas at both the transmit and receive ends has become one of the most important paradigms for the deployment of existing and emerging wireless communications systems. MIMO constitutes a cost effective approach to high-throughput wireless communications. MIMOs are capable of supporting significantly higher data rates than the Universal Mobile Telecommunications System (UMTS) and the High-Speed Downlink Packet Access (HSDPA) based 3G networks. MIMO OFDM(Orthogonal Frequency-Division Multiplexing) communication systems have shown increased capacity, coverage and achievable reliability with the aid of MIMO techniques. The OFDM has emerged as a successful air-interface multicarrier digital modulation technique advocated by many European standards, such as Digital Audio Broadcasting (DAB), Digital Video Broadcasting for Terrestrial television (DVB-T), Digital Video Broadcasting for Handheld terminals (DVB-H) , Wireless Local Area Networks (WLANs) and Broadband Radio
  • 2. 464 Computer Science & Information Technology ( CS & IT ) Access Networks (BRANs).Hi including WiMAX and LTE, a spectral efficiency and performa becomes possible to increase pe systems. The MIMO based OF significantly higher bit rates. The OFDM with higher order ada techniques[1-3]. 2. MATHEMATICAL MODEL In our presently considered communication system, various (ECB) and Cipher Feedback description is given below. 2.1. Pre-Channel Equalizati In pre channel equalization sch matrix in complex form(W ∈ C2 vector x ∈ C2 x 1 can be expre is the original symbol vector for transmission. In case of employment, the corresponding weight matrix (assuming that the channel given as Where β is a constant to meet the is given with two transmitting a To compensate for the effect of signal must be divided by b vi signal y is given by Computer Science & Information Technology ( CS & IT ) igh-speed cellular and WLAN standards (i.e., and 802.11a,g,n) have migrated to OFDM, which ance With MIMO signal processing and wider band eak bit rates to the range of 100 Mb/s in both LTE FDM technologies have been used in WLAN system The 802.11n standard has a peak bit rate of 300 aptive modulation and MIMO along with mult ODEL d secured spatially multiplexed MIMO OFD ous Pre channel equalization schemes, Electroni (CFB) cryptographic algorithms have been use ion heme, pre equalization is represented by a pre-equ C2 x 2) and the precoded digitally modulated comp ressed as tor for transmission. In case of zero-forcing (ZF) equalization employment, the corresponding weight matrix (assuming that the channel matrix H issquare) is he total transmitted power constraint after pre-equali antenna(NT=2) as of amplification by a factor of β at the transmitter, ia automatic gain control (AGC) at the receiver, The ., 4G cellular offers higher nd channels, it and WiMAX ms to achieve 00 Mb/s using tiple channel DM wireless ic Codebook sed. A brief ualizer weight omplex symbol (1) forcing (ZF) equalization matrix H issquare) is (2) lization and it (3) , the received The received (4)
  • 3. Computer Science & Information Technology ( CS & IT ) Other than ZF pre-equalization, theweight matrix is given as Where, the constant β is used ag It is calculated by Equation (3) r equalization scheme on the tra attributed to the fact that the rece course of equalization[4]. 2.2. Cryptographic algorithm Cryptography is synonymous with encryption and used exclusively on providing confidentiality of messages. With the advancement of information technology, a great emphasis has been gi to provide confidentiality, integrity and Symmetric Key Cryptography, there are two types of symmetric key cipher; namely, stream ciphers and block ciphers. With stream ciphers, data is encrypted one digit (bit or byte) at a time. Stream ciphers approximate one block cipher processes fixed-length groups of bits. A block of plaintext symbols are encrypted to create a block ciphertext of the same size [6]. The most widely used encryption scheme is based on the Data E adopted in 1977 by the National Bureau of Standards. The DES scheme is essentially a block cipher technique that uses certainnumber of bit blocks. In Electronic Codebook (ECB) block cipher cryptographic scheme, we have divided the 64 bits. Each block of plaintext is encrypted using the same key of size 64 bits. In Cipher Feedback (CFB) cryptographic scheme, the input is processed with64 bits at a time. Preceding ciphertext is used as input to the encryption algorithm to produce pseudorandom output, which is XORed with plaintext to produce next unit of ciphertext [7]. 3. COMMUNICATION SYSTEM A simulated single -user 2 x 2 spatially multiplexed MIMO OFDM wireless communication system as depicted in Figure 1 utilizes two pre channel equalization schemes.In such a communication system, the text message is encrypted doubly with concatenation of Codebook (ECB) and Cipher Feedback ( CFB) cryptographic algorithm. The encrypted text message is channel encoded using each of the three channel coding scheme ( ½ convolutional, CRC an BCH) and interleaved for minimization o bits are digitally modulated using two types of digital modulations such as Quadrature Phase Shift Keying (QPSK) and Quadrature Amplitude (QAM) [8,9]. The complex digitally modulated symbols are spatially m (STBC), an efficient transmit diversity scheme [10]. The outputs of Computer Science & Information Technology ( CS & IT ) on, MMSE pre-equalization can also be used. I gain to meet up the total transmitted power constrain replacing with . It is noted ansmitter side outperforms the receiver-side equa eceiver-side equalization suffers from noise enhanc 2.2. Cryptographic algorithm synonymous with encryption and used exclusively on providing confidentiality of messages. With the advancement of information technology, a great emphasis has been gi fidentiality, integrity and authentication for secured data transmission. In Symmetric Key Cryptography, there are two types of symmetric key cipher; namely, stream ciphers and block ciphers. With stream ciphers, data is encrypted one digit (bit or byte) at a time. Stream ciphers approximate one-time pad ciphers (also known as Vernam ciphers). In contrast, a length groups of bits. A block of plaintext symbols are encrypted to create a block ciphertext of the same size [6]. The most widely used encryption scheme is based on the Data Encryption Standard (DES) adopted in 1977 by the National Bureau of Standards. The DES scheme is essentially a block cipher technique that uses certainnumber of bit blocks. In Electronic Codebook (ECB) block cipher cryptographic scheme, we have divided the whole message into several blocks of each size 64 bits. Each block of plaintext is encrypted using the same key of size 64 bits. In Cipher Feedback (CFB) cryptographic scheme, the input is processed with64 bits at a time. Preceding input to the encryption algorithm to produce pseudorandom output, which is XORed with plaintext to produce next unit of ciphertext [7]. YSTEM MODEL user 2 x 2 spatially multiplexed MIMO OFDM wireless communication system as depicted in Figure 1 utilizes two pre channel equalization schemes.In such a communication system, the text message is encrypted doubly with concatenation of Codebook (ECB) and Cipher Feedback ( CFB) cryptographic algorithm. The encrypted text message is channel encoded using each of the three channel coding scheme ( ½ convolutional, CRC an BCH) and interleaved for minimization of burst errors. The interleaved bits are digitally modulated using two types of digital modulations such as Quadrature Phase Shift Keying (QPSK) and Quadrature Amplitude (QAM) [8,9]. The complex digitally modulated symbols are spatially multiplexed using Alamouti’s space –time block coding it diversity scheme [10]. The outputs of the Space- 465 In this case, (5) nt. d that the pre- alization. It is cement in the synonymous with encryption and used exclusively on providing confidentiality of messages. With the advancement of information technology, a great emphasis has been given transmission. In Symmetric Key Cryptography, there are two types of symmetric key cipher; namely, stream ciphers and block ciphers. With stream ciphers, data is encrypted one digit (bit or byte) at a time. also known as Vernam ciphers). In contrast, a length groups of bits. A block of plaintext symbols are encrypted to ncryption Standard (DES) adopted in 1977 by the National Bureau of Standards. The DES scheme is essentially a block cipher technique that uses certainnumber of bit blocks. In Electronic Codebook (ECB) block whole message into several blocks of each size 64 bits. Each block of plaintext is encrypted using the same key of size 64 bits. In Cipher- Feedback (CFB) cryptographic scheme, the input is processed with64 bits at a time. Preceding input to the encryption algorithm to produce pseudorandom output, which is user 2 x 2 spatially multiplexed MIMO OFDM wireless communication system as depicted in Figure 1 utilizes two pre channel equalization schemes.In such a communication system, the text message is encrypted doubly with concatenation of Electronic Codebook (ECB) and Cipher Feedback ( CFB) cryptographic algorithm. The encrypted text message is channel encoded using each of the three channel coding scheme ( ½-rated f burst errors. The interleaved bits are digitally modulated using two types of digital modulations such as Quadrature Phase Shift Keying (QPSK) and Quadrature Amplitude (QAM) [8,9]. The complex digitally time block coding - time block
  • 4. 466 Computer Science & Information Technology ( CS & IT ) encoder are sent up into two serial to parallel converter. The serial to parallely (S/P) converted complex data symbols are fed into each of the two OFDM modulator with 1024 sub carriers which performs an IFFT on each OFDM block of length 1024 followed by a parallel –to- serial conversion. A cyclic prefix (CP) of length Lcp (0.1*1024) containing a copy of the last Lcp samples of the parallel –to- serial converted output of the 1024-point IFFT is then prepended. The CP is essentially a guard interval which serves to eliminate interference between OFDM symbols. Figure 1: Block diagram of a Pre-Channel Equalization based secured MIMO OFDM wireless communication system However, the resulting OFDM symbols of length 1024+ Lcp are weighted with pre equalization channel coefficients prior to lunching from the two transmitting antenna. In case of post channel equalization, no pre-channel equalization operation is performed. However, in receiving section, the signals are detected and passed through automatic gain controlling section to compensate the effect of amplification at the transmitter. The detected signals are subsequently sent up to the serial to parallel (S/P) converter and fed into OFDM demodulator which performs FFT operation on each OFDM block. The FFT operated OFDM blocked signal are processed with cyclic prefix removing scheme and are undergone from parallel to serial conversion and are fed into Space time block decoder. Its output in complex symbols are digitally demodulated, deinterleaved, channel decoded and decrypted doubly to recover the transmitted text message.
  • 5. Computer Science & Information Technology ( CS & IT ) 467 4. RESULT AND DISCUSSION The present simulation based study has been made for MIMO OFDM wireless communication system in consideration with various parameters presented in Table 1. Table 1: Summary of the simulated model parameters Text message(Converted into bits) 1024 Channel Coding ½-rated Convolutional, CRC and BCH Channel EncodingModulation QPSK and QAM No of OFDM sub-carriers 1024 Cryptographic algorithm Electronic Codebook(ECB) and Cipher Feedback(CFB) Channel Equalization Scheme Pre-Mean Square error (Pre-MMSE) and Pre-Zero- Forcing (Pre-ZF) CP length 103 symbols Channel AWGN and Rayleigh Signal to noise ratio, SNR 0 to10 dB We have conducted computer simulations to observe the impact of pre and post channel equalization schemes on the BER performance of the secured MIMO OFDM wireless communication system based on the parameters given in Table 1. It is assumed that the channel state information (CSI) is available at the transmitter side and the fading process is approximately constant during one OFDM block length. The graphical illustrations presented in Figure 2 through Figure 5 show system performance comparison with implementation of pre-MMSE and pre-ZF based Channel equalization schemes under QPSK and QAM digital modulations. In all cases, it is noticeable that Pre-ZF based channel equalization with BCH channel coding schemes improves the system performance. In Figure 2, it is observable that the system performance is well discriminable less than three different channel coding schemes. For a typically assumed SNR value of 2 dB, the BER values are 0.4609 and 0.2485 in case of Convolutional and BCH channel coding schemes under QPSK and Pre-MMSE and viz., the system achieves a gain of 2.68 dB in BCH as compared to ½-rated Convolutional. The system shows well defined performance over a large examined SNR values under the situation of three channel coding schemes and QAM and Pre- MMSE (Figure 3). At a SNR value of 2 dB, the system performance is improved by 3.15dB for BER values of 0.1673 and 0.3454 in case of BCH as compared to ½-rated Convolutional.
  • 6. 468 Computer Science & Information Technology ( CS & IT ) Figure 2 : BER Performance of a secured MIMO OFDM wireless communication with implementation of different Channel coding, Pre-MMSE channel equalization and QPSK digital modulation schemes. Figure 3 : BER Performance of a secured MIMO OFDM wireless communication with implementation of different Channel coding, Pre-MMSE channel equalization and QAM digital modulation schemes. In Figure 4, and Figure 5, it is observable that the rate of system performance improvement with increase in SNR values. is comparatively higher in Convolutional coding as compared to CRC and BCH. In Figure 4 and Figure 5, the system performance improvement is found to have values of 2.76dB (BERs: 0.2363 and 0.4461) and 3.40dB(BERs: 0.1565 and 0.3425) at a typically assumed SNR value of 2 dB in case of most satisfactory and worst system performance.
  • 7. Computer Science & Information Technology ( CS & IT ) 469 Figure 4 : BER Performance of a secured MIMO OFDM wireless communication with implementation of different Channel coding, Pre-ZF channel equalization and QPSK digital modulation schemes. Figure 5 : BER Performance of a secured MIMO OFDM wireless communication with implementation of different Channel coding, Pre-ZF channel equalization and QAM digital modulation schemes. In Figure 6, a BER comparison has been made for the system in identical channel coding and different digital modulation and pre-channel equalization schemes. It is remarkable that over a significant SNR value area, the system shows quite satisfactory performance in QAM, Pre-ZF and BCH schemes. Under identical implementation of channel coding (BCH) scheme, the system shows worst performance in QPSK and Pre-MMSE. Asystem performance improvement of 2.01 dB is achieved at SNR value of 2dB in QAM, Pre-ZF and BCH schemes as compared to QAM, Pre-MMSE and BCH(BERs: 0.1565 and 0.2485).
  • 8. 470 Computer Science & Information Technology ( CS & IT ) Figure 6 : BER Performance Comparison of the MIMO OFDM wireless communication system for different Pre channel equalization and digital modulation schemes under BCH channel coding scheme. In Figure 7, the transmitted, doubly encrypted and retrieved text messages at 4dB and 6dB have been presented under implementation of QAM, Pre-ZF and BCH channel coding schemes. The estimated BER values are found to have values of 0.0166 and 0.000. Multiple-input multiple-output systems have attracted considerable attention due to the linear growth of the system capacity. (a) _Íjz¶9ãx ¼Bù_Á¨ùN£|×óù >nq½a ydy(_ôj?¬ sùêüß) b É6õ19êxß 7ÙA¢ Ïj u&êZ yQØÀa_jò°,êZßIV+ $#`?o ð×B· (b) Multiple-input multipLeoõôx}ô óystemshave attracted considerable attention due to the linear growth of the system0s1`!cmpy. (c) Multiple-input multiple-output systems have attracted considerable attention due to the linear growth of the system capacity. (d) Figure 7 : Presented text message in various forms in a MIMO OFDM wireless communication system , (a) Transmitted, (b) Doubly Encrypted (c) Retrieved message at 4 dB (d) Retrieved message at 6 dB. Red marks indicate noise contamination
  • 9. Computer Science & Information Technology ( CS & IT ) 471 5. CONCLUSIONS In our present study, we have studied the performance of a Convolutionally encoded 2 x 2 spatially multiplexed MIMO-OFDM wireless communication system adopting various digital modulations, channel coding and Pre channel Equalization schemes. A range of system performance results highlights the impact of a simplified digital modulation, Pre channel Equalization (signal detection) and channel coding techniques. In the context of system performance, it can be concluded that the implementation of QAM digital modulation technique with implemented Pre-ZF channel equalization and BCH channel coding schemes in FEC encoded MIMO-OFDM wireless communication system provides satisfactory performance in retrieving the transmitted message of the sender. REFERENCES [1] LajosHanzo, YosefAkhtman, Li Wang and Ming Jiang, (2011), " MIMO-OFDM for LTE, Wi-Fi and WiMAX , Coherent versus Non-coherent and Cooperative Turbo-transceivers", John Wiley and Sons, Ltd, United Kingdom. [2] DipankarRaychaudhuri and Narayan B. Mandayam ,(2012), " Frontiers of Wireless and Mobile Communications" , Proceedings of the IEEE vol. 100, no. 4, pp. 828-840. [3] Alain Sibille, Claude Oestges and Alberto Zanella, (2011), "MIMO From Theory to Implementation" , Elsevier Inc., United Kingdom [4] Yong Soo Cho, Jaekwon Kim, Won Young Yang, Chung G. Kang, (2010), "MIMO-OFDM Wireless Communications with MATLAB", John Wiley and Sons (Asia) Pte Limited, Singapore. [5] Lin BaiandJinho Choi(2012), "Low Complexity MIMO Detection", Springer Science and Business Media, LLC ,New York, USA [6] Alan Holt and Chi-Yu Huang (2010), "802.11 Wireless Networks Security and Analysis", Springer-Verlag London Limited, New York. [7] William Stallings(2005),"Cryptography and Network Security Principles and Practices", Fourth Edition, Prentice Hall Publisher. [8] Theodore S Rappaport(2001) Wireless Communications: Principles and Practice, Second Edition, Prentice Hall, Upper Saddle River, New Jersey, USA [9] Goldsmith, Andrea, 2005 :Wireless Communications, First Edition, Cambridge University Press,United Kingdom [10] Siavash M. Alamouti (1998), A Simple Transmit Diversity Technique For Wireless Communications, IEEE Journal on Select areas in Communications, vol.16, no.8, pp.1451-1458
  • 10. 472 Computer Science & Information Technology ( CS & IT ) AUTHORS Dr S.SARAVANAKUMAR has more than 10 years of teaching and research experience. He did his Postgraduate in ME in Computer Science and Engineering at Bharath engineering college, Chennai, and PhD in Computer Science and Engineering at Bharath University, Chennai. He Lecturer, Assistant Professor and Associate Professor and HOD. He has published more than 35 research papers in High Impact factor International Journal, National and International conferences a Bangkok and Singapore. He has guiding a number of research scholars in the area Adhoc Network, ANN, Security in Sensor Networks, Mobile Database and Data Mining under Bharath University Chennai, Sathayabama Universit Ms. R. Dharani has more than 8 years of teaching experience. She has occupied various positions as Lecturer, Senior Lecturer, Assistant Professor (Grade more than 25 research papers in High Impact fac International conferences and visited many countries like Taiwan, Bangkok and Singapore. He has guiding a number of research scholars in the area Adhoc Network, ANN, Security in Sensor Networks, Mobi Bharath University Chennai, Sathayabama University and Bharathiyar University. G. Aniruth Sabapathy is a final year student pursuing his B.tech Information Technology, Panimalar institute of conferences and National level computing, peer to peer systems and s are Database management and systems, optimization. He has created a search engine optimization website (www.directionswitch.com). Nirmal das.D is a final year student pursuing his B.Tech Information Technology, in Panimalar institute of technology, Chennai. He has attended several conferences and National level symposium. He has submitted papers on peer to peer systems and search engine optimization. His domain of Interest in the area Adhoc Network, ANN, Security in Sensor Networks, Mobile Database and Data Mining. S.Srikanth is a final year student pursuing his B.Tech Information Technology, in Panimalar institute of technology, Chennai. He has attended several conferences and National level symposium. He has submitted pa systems and search engine optimization. His domain of Interest are Database management and systems, web technology, web designing, search engine optimization Computer Science & Information Technology ( CS & IT ) has more than 10 years of teaching and research experience. He did his Postgraduate in ME in Computer Science and Engineering at Bharath engineering college, Chennai, and PhD in Computer Science and Engineering at Bharath University, Chennai. He occupied various positions as Lecturer, Senior Lecturer, Assistant Professor and Associate Professor and HOD. He has published more than 35 research papers in High Impact factor International Journal, National and International conferences and visited many countries like Taiwan, Bangkok and Singapore. He has guiding a number of research scholars in the area Adhoc Network, ANN, Security in Sensor Networks, Mobile Database and Data Mining under Bharath University Chennai, Sathayabama University and Bharathiyar University. has more than 8 years of teaching experience. She has occupied various positions as Lecturer, Senior Lecturer, Assistant Professor (Grade-I) . She has published more than 25 research papers in High Impact factor International Journal, National and International conferences and visited many countries like Taiwan, Bangkok and Singapore. He has guiding a number of research scholars in the area Adhoc Network, ANN, Security in Sensor Networks, Mobile Database and Data Mining under Bharath University Chennai, Sathayabama University and Bharathiyar University. final year student pursuing his B.tech Information Panimalar institute of technology, Chennai. He has attended several National level symposium. He has submitted papers on cloud peer to peer systems and search engine optimization. His domain of Interest are Database management and systems, web technology, web designing, search engine created a search engine optimization website Nirmal das.D is a final year student pursuing his B.Tech Information Technology, hnology, Chennai. He has attended several conferences and National level symposium. He has submitted papers on peer to peer systems and search engine optimization. His domain of Interest in the area Adhoc Network, etworks, Mobile Database and Data Mining. S.Srikanth is a final year student pursuing his B.Tech Information Technology, in Panimalar institute of technology, Chennai. He has attended several conferences and National level symposium. He has submitted papers on cloud computing, peer to peer systems and search engine optimization. His domain of Interest are Database management and systems, web technology, web designing, search engine optimization Adhoc Network, ANN, Security in Sensor Networks, Mobile Database and Data Mining under Bharath