International Journal of Mobile Network Communications & Telematics (IJMNCT) is an open access peer-reviewed journal that addresses the impacts and challenges of mobile communications and telematics. The journal also aims to focus on various areas such as ecommerce, e-governance, Telematics, Telelearning nomadic computing, data management, related software and hardware technologies, and mobile user services. The journal documents practical and theoretical results which make a fundamental contribution for the development of mobile communication technologies.
TOP CITED ARTICLES IN MOBILE NETWORK COMMUNICATIONS & TELEMATICS RESEARCH ARTICLES
1. TOP CITED ARTICLES IN MOBILE NETWORK
COMMUNICATIONS & TELEMATICS RESEARCH
ARTICLES
INTERNATIONAL JOURNAL OF MOBILE NETWORK
COMMUNICATIONS & TELEMATICS (IJMNCT)
ISSN: 1839 – 5678
http://wireilla.com/ijmnct/index.html
2. Citation Count – 12
A VERTICAL HANDOVER DECISION APPROACHES IN NEXT GENERATION
WIRELESS NETWORKS: A SURVEY
Harsha A. Bhute1
, Dr. P.P Karde2
, Dr. V.M. Thakare3
1
Department of Computer Engineering, Sinhgad College of Engineering, Pune, India
2
Department of Information Technology, Government Polytechnic, Professor, Amravati, India
3
Professor & Head, Department of Computer Science, SGBAU, Amravati University, Amravati, India
ABSTRACT
In next generation wireless network the most desirable feature is its ability to move seamlessly over various
access network regardless of the network infrastructure is used. The handover between these dissimilar networks
can be explored by using vertical handover algorithms. This paper focuses on the vertical handover decision
methods and algorithms effectiveness. Most of the algorithms which are based on RSS values provide vertical
handover with small delay at a lower rate of throughput. There are such algorithms which provide significant
improvements in throughput but at a cost of higher delays. As per the need for the real time applications in next
generation wireless networks there is a requirement of developing new optimized algorithms that are able to
produce high throughput and minimizing signaling cost and delay.
KEYWORDS
Vertical handover, QoS, mobile networks, next generation wireless networks.
FOR MORE DETAILS: https://wireilla.com/papers/ijmnct/V4N2/4214ijmnct04.pdf
VOLUME LINK: https://wireilla.com/ijmnct/vol4.html
3. REFERENCES
[1] O. Ormond, G. Muntean and J. Murphy, “Network Selection Strategy in Heterogeneous Wireless Networks,”
Proc. of IT&T 2005: Information Technology and Telecommunications, pp. 175-184, Cork, October 2005.
[2] L.-J. Chen, G. Yang, T. Sun, M.Y. Sanadidi, M. Gerla, “Enhancing QoS support for vertical handovers using
implicit/explicit handover notifications,” In 2nd IEEE International Conference on Quality of Service in
Heterogeneous Wired/Wireless Networks, pp. 8-37, 2005.
[3] Y.C. Chen, J.H. Hsia and Y.J. Liao, “Advanced seamless vertical handover architecture for WiMA and WiFi
heterogeneous networks with QoS guarantees,” Computer Communications, Volume 32 Issue 2, February 2009,
Pages 281-293.
[4] L. J. Chen et al, “A smart decision model for vertical handover,” In Proc. of the 4th International Workshop
on Wireless Internet and Reconfigurability. (ANWIRE 2004), Athens, Greece, May 2004.
[5] A. H. Zahran, B. Liang, and A. Saleh, “Signal threshold adaptation for vertical handover in heterogeneous
wireless networks,” Mobile Networks and Applications, vol. 11, no. 4, pp. 625-640, August 2006.
[6] I.F. Akyildiz, J. McNair, J.S.M. Ho, H. Uzunalioglu, W. Wang, “Mobility management in nextgeneration
wireless systems,” Proceedings of the IEEE, vol. 87, no. 8, pp. 1347-1384, August 1999.
[7] F. Zhu and J. McNair, “Optimizations for vertical handover decision algorithms,” In Proceedings of the 2004
IEEE Wireless Communications and Networking Conference (WCNC 2004), vol. 2, pp. 867–872, 2004.
[8] S. Balasubramaniam and J. Indulska, “Vertical handover supporting pervasive computing in future wireless
networks,” Computer Communications, vol. 27, no. 8, pp. 708–719, 2004.
[9] H. Wang, R. Katz, J. Giese, “Policy-enabled handovers across heterogeneous wireless networks,” Second
IEEE Workshop on Mobile Computing Systems and Applications, 1999 (Proceedings WMCSA’99), 1999, pp.
51-60.
[10] S. Quiqyang and A. Jamalipour, “A network selection mechanism for next generation networks,” In
International Conference of Communications, 2005 (ICC 2005), vol. 2, 2005, pp. 1418–1422.
[11] W. Zhang, “Handover Decision Using Fuzzy MADM in heterogeneous networks,” In Proc. IEEE
WCNC’05, New Or-leans, LA March 2005.
[12] Y. Nkansah-Gyekye and J. I. Agbinya, "Vertical handover between WWAN and WLAN,"
ICNICONSMCL'06, 2006
[13] K. Pahlavan, P. Krishnamurthy, A. Hatami, M. Ylianttila, J. Makela, R. Pichna, and J. Vallstron, “Handover
in hybrid mobile data networks,” IEEE Personal Communications, 7(2):34–47, 2000.
[14] L. Xia, L.-G. Jiang, and C. He, “A novel fuzzy logic vertical handover algorithm with aid of differential
prediction and pre-decision method,” In Proceedings of the 2007 IEEE International Conference on
Communications (ICC’07), pages 5665–5670, Glasgow, Scotland, June 2007.
[15] M.Kassar, B.Kervella, G.Pujolle, “An overview of vertical handover decision strategies in heterogeneous
wireless networks,” Elsevier, Journal of computer communications, Vol.37, No.10, 2008.
[16] J.Y. Hwang, J. Oh and Y. Han, “A two-step vertical handover algorithm in heterogeneous traffic and
systems,” In 66th IEEE Vehicular Technology Conference, 2007, pp. 1543-1547.
6. Citation Count –09
SECURITY ATTACKS TAXONOMY ON BRING YOUR OWN DEVICES (BYOD)
MODEL
Manmeet Mahinderjit Singh, Soh Sin Siang, Oh Ying San, Nurul Hashimah Ahamed Hassain Malim and Azizul
Rahman Mohd Shariff,
Universiti Sains Malaysia, Malaysia
ABSTRACT
Internet banking has the potential to provide fast and reliable services to customers for which they are relatively
happy. Due to the technological changes taking place all over the world, many institutions, including the banking
sector have taken giant steps to move in tandem with these changes. In this light most banks, with GCB Bank,
Ghana, not being an exception have introduced electronic banking in order to decongest the banking halls of
customers who spend time unending in order to transact business. The purpose of this research was to assess the
Contribution of Electronic Banking to Customer Satisfaction at GCB Bank-Koforidua, to this end some
objectives were set for the study. These were: To assess the availability of electronic banking facilities at GCB
Bank, Koforidua. To assess the knowledge and patronage of internet banking services by customers, to examine
the effectiveness of the usage of electronic banking facilities, to examine the problem facing an internet banking
in GCB Bank, Koforidua. This is a quantitative study that employed the use of questionnaires as the main tools
for data collection. Data was collected from management, staff and customers of GCB Bank, Koforidua Branch.
Findings from analysis of data revealed that though there was the existence of internet banking facilities of the
bank, respondents of the study were not fully aware of the existence of such facilities. It was also found that the
use of internet banking was quite expensive and that though the bank was utilizing the facility, customers were
not fully patronizing them. It was concluded that internet banking brings efficiency in the operations of the bank.
Finally, the study recommended that all branches of GCB Bank adopt internet banking facilities to help in
effective banking operations and transactional purposes. To maximize the operations and potential of the bank
management must endeavor to educate the customers about the existence of internet banking facilities since a
few customers were aware of the existence of such facilities.
KEYWORDS
Bring Your Own Device (BYOD) model; Advanced Persistent Threat (APT) attack, Malware; Smartphone;
Security
FOR MORE DETAILS: https://wireilla.com/papers/ijmnct/V4N5/4514ijmnct01.pdf
VOLUME LINK: https://wireilla.com/ijmnct/vol4.html
7. REFERENCES
[1] Osterman Research by Dell, “The Need for IT to Get in Front of the BYOD Problem White Paper”, January,
2013.
[2] Georg Disterer, Carsten Kleiner, BYOD Bring Your Own Device,CENTERIS 2013 - Conference on
ENTERprise Information Systems / ProjMAN 2013 -International Conference on Project MANagement / HCIST
2013 - International Conference on Health and Social Care Information Systems and Technologies, May 2013
[3] Check Point Software Technologies Dimensional Research, “The Impact of Mobile Devices on Information
Security”, June, 2013.
[4] Lumension Information Security, “2013 Survey Results of BYOD & Mobile Security”, 2013.
[5] iBanking: Exploiting the Full Potential of Android Malware [Online]
http://www.symantec.com/connect/blogs/ibanking-exploiting-full-potential-android-malware Accessed date:
20/5/2014
[6] Owasp Mobile Security project https://www.owasp.org/index.php/
OWASP_Mobile_Security_Project#tab=Top_10_Mobile_Risks Accessed Date : 20/5/2014
[7] SYBASE, “Mobility Advantage: Why Secure Your Mobile Devices? White Paper”, February 2013.
[8] Jessica Keyes, “Bring Your Own Devices (BYOD) Survival Guide”, CRC Press Taylor & Francis Group,
Boca Raton, 2013
[9] Brian Prince (16th April 2014), SQL Injection Breaches Take Months to Uncover and Fix: Survey, [Online]
Available: http://www.securityweek.com/sql-injection-breaches-take-months-uncover-andfix-survey, Last
Accessed Date: 23 May 2014.
[10] Dell Secure Works, “Anatomy of an Advanced Persistent Threat (APT)”, 31 March, 2011.
[11] Command Five Pty Ltd, “Advanced Persistent Threats: A Decade in Review”, June 2011.
[12] Why heartbleed could be much worse for android user [Online]
http://bgr.com/2014/04/16/heartbleedandroid-4-1-1-jelly-bean/ Accessed date: 17/5/2014
[13] Mobile Security Reference Architecture v1.0, CIO council, 23 May 2013
[14] Antonio Scarfo, Maticimind Spa, “New Security Perspectives Around BYOD, Wireless Computing”,
Communication and Applications, 2012.
[15] Johannes de Vries & Hans Hoogstraaten, “Systems for Detecting Advanced Persistent Threats”,
International Conference on Cyber Security, 2012.
[16] Tarique, Mustafa, “Malicious Data Leak Prevention and Purposeful Evasion Attacks: An Approach to
Advanced Persistent Threat (APT) Management”, Conference at IEEE, 2013.
[17] Websense, “Advanced Persistent Threats And Other Advanced Attacks White Paper”, 2011
[18] iGR, “The Trusted Computing Group Mobile Specification: Securing Mobile Devices on Converged
Networks White Paper”, September, 2006.
[19] T. Andrew, Radu Vlas, Alan Yang & Cristina Vlas, “Risk Management in Era of BYOD”, IEEE Computer
Society, 2013.
8. [20] Sean Chung, Barbara & Yan Bai, “2TAC: Distributed Access Control Architecture for “Bring Your Own
Device” Security”, IEEE International Conference on BioMedical Computng, 2012.
[21] T. Ruesbsamen, and C. Reich, “Enhancing Mobile Devices Security by Security Level Integration in a
Cloud Proxy”, The Third International Conference on Cloud Computing, GRIDs, and Virtualization,
Furtwangen, Germany, pp. 159-168, July 2012.
[22] R.G. Lenon, “Changing User Attitudes to Security in Bring Your Own Device (BYOD) & the Cloud”,
Computing Department, Ireland, 2012.
[23] Antonio Scarfo, Maticimind Spa, “New Security Perspectives Around BYOD, Wireless Computing”,
Communication and Applications, 2012.
[24] J.A, de Vries, “Towards a roadmap for development of intelligent data analysis based cyber attack detection
systems”, Delft University of Technology, 5th July 2012.
[25] iGR, “The Trusted Computing Group Mobile Specification: Securing Mobile Devices on Converged
Networks White Paper”, September, 2006.
[26] Wei Feng, “TEEM: A User Oriented Trusted Mobile Device for Multi-platform Security Applications”,
Institute of Software Academy of Sciences, 2013.
[27] Zhang Dawei and Han Zhen, “Protocol for Trusted Channel Based on Portable Trusted Module”, Trusted
Computing and Information Security, 2012.
[28] Kathleen N. McGill, “Trusted Mobile Devices: Requirements for a Mobile Trusted Platform Module”,
Johns Hopkins APL Technical Digest, vol. 32, 2013.
[29]Allen Bethea (2012), What is the difference between SHA-1 and SHA-256, [Online] Available:
http://www.ask.com/explore/difference-between-sha1-sha256-2062 Last accessed date: 23 May 2014.
[30] Liqun Chen and Mark Ryan, “Attack, solution and verification for shared authorization data in TCG TPM”,
University of Birningham, UK, 2011.
[31] International Data Corporation; Apple Cedes Market Share in Smartphone Operating System Market as
Android Surges and Windows Phone Gains, According to IDC; published 7 August 2013;
http://www.idc.com/getdoc.jsp?containerId=prUS24257413.
[32] Cisco Security Threat Report 2014 [Online]
https://www.cisco.com/web/offer/gist_ty2_asset/Cisco_2014_ASR.pdf accessed date: 18/5/2014.
[33] F-Secure, “Mobile Threat Report Q3 2013”, F-Secure Corporation, Helsinki, 5 November, 2013.
[34] Trend Micro, “Implementing BYOD plan” , Trend Micro Corporation [Online]
http://www.trendmicro.com/cloud-content/us/pdfs/businessrep orts/rpt_implementing_byod_plans.pdf Accessed
date : 17/5/2014
[35] Why heartbleed could be much worse for android user [Online]
http://bgr.com/2014/04/16/heartbleedandroid-4-1-1-jelly-bean/ Accessed date: 17/5/2014
[36] Ebay ask 145 million user to change their password after cyber attack [Online]
http://uk.reuters.com/article/2014/05/21/uk-ebay-password-idUKKBN0E10ZL20140521 Accessed date:
20/5/2014
[37] BlueBox, “A New Era Dawns in Mobile Data Security”, whitepaper, August 2013
[38] F-Secure, “Mobile Threat Report Q1 2013”, F-Secure Corporation, Helsinki, 11 May, 2013.
9. [39] Mark Shepherdson, Trustmarque, “BYOD – the biometric implications” Volume 2013, Issue 4, Pages 5–7,
April 2013
[40] John Thielens, “Why APIs are central to a BYOD security strategy”, ScienceDirect network security
Volume 2013, Issue 8, Pages 5–6 August 2013
[41] Khoula Alharthy, Wael Shawkat, Implement Network security control solutions in BYOD environment,
2013 IEEE international conference on control system, computing and engineering, Penang, Malaysia, 29 Nov-1
Dec 2013
10. Citation Count – 09
PERFORMANCE COMPARISON OF TWO CLIPPING BASED FILTERING METHODS
FOR PAPR REDUCTION IN OFDM SIGNAL
Md. Munjure Mowla1
, Md. Yeakub Ali2
and Rifat Ahmmed Aoni3
1,2
Department of Electronics & Telecommunication Engineering, Rajshahi University of Engineering &
Technology, Rajshahi - 6204, Bangladesh
3
Department of Electrical Engineering, University of Malaya, Kuala Lumpur -50603, Malaysia
ABSTRACT
The growth of wireless communication technologies has been producing the intense demand for high-speed,
efficient, reliable voice & data communication. As a result, third generation partnership project (3GPP) has
implemented next generation wireless communication technology long term evolution (LTE) which is designed
to increase the capacity and speed of existing mobile telephone & data networks. LTE has adopted a multicarrier
transmission technique known as orthogonal frequency division multiplexing (OFDM). OFDM meets the LTE
requirement for spectrum flexibility and enables cost-efficient solutions for very wide carriers. One major
generic problem of OFDM technique is high peak to average power ratio (PAPR) which is defined as the ratio of
the peak power to the average power of the OFDM signal. A trade-off is necessary for reducing PAPR with
increasing bit error rate (BER), computational complexity or data rate loss etc. In this paper, two clipping based
filtering methods have been implemented & also analyzed their modulation effects on reducing PAPR.
KEYWORDS
Bit Error rate (BER), Complementary Cumulative Distribution Function (CCDF), Long Term Evolution (LTE),
Orthogonal Frequency Division Multiplexing (OFDM) and Peak to Average Power Ratio (PAPR)
FOR MORE DETAILS: https://wireilla.com/papers/ijmnct/V4N1/4114ijmnct03.pdf
VOLUME LINK: https://wireilla.com/ijmnct/vol4.html
11. REFERENCES
[1] R. Prasad, OFDM for Wireless Communications Systems. London, Boston: Artech House, Inc, 2004.
[2] S. H. Han and J. H. Lee, “An overview of peak-to-average power ratio reduction techniques for multicarrier
transmission”, IEEE Wireless Comm, vol. 12, no.2, pp.56-65, Apr. 2005.
[3] Md. Munjure Mowla, “Peak to average power ratio analysis and simulation in LTE system”, M.Sc
dissertation, Department of Electrical & Electronic Engineering, Rajshahi University of Engineering &
Technology, Bangladesh, 2013.
[4] Muhammad Atif Gulzar , Rashid Nawaz and Devendra Thapa, “Implementation of MIMO-OFDM System
for WiMAX”, M.Sc Dissertation, Department of Electrical Engineering, Linnaeus University, Sweden, 2011.
[5] Natalia Revuelto, “PAPR reduction in OFDM systems”, M.Sc Dissertation, Universitat Politecnica de
Catalunya, Spain, 2008.
[6] Y.S. Cho, J. Kim, W.Y.Yang and C.G. Kang, MIMO OFDM Wireless Communications with MATLAB,
Singapore: John Wiley & Sons (Asia) Pte Ltd, 2010.
[7] M.M.Mowla and S.M.M. Hasan, “Performance improvement of PAPR reduction for OFDM signal in LTE
system”, International Journal of Wireless & Mobile Networks (IJWMN), Volume 5, Number 4, August 2013
(ISSN: 0975-3834).
12. Citation Count – 09
A REVIEW PAPER ON: THE PAPR ANALYSIS OF ORTHOGONAL FREQUENCY
DIVISION MULTIPLEXING (OFDM)
MOHSIN KHAN1
, SAMIMA IQBAL2
and WASEEM ASGHAR3
1
Department of Computer Science, Lahore Garrison University, Lahore
2, 3
Computing & Technology Department, IQRA University Islamabad Campus
AABBSSTTRRAACCTT
OFDM (Orthogonal Frequency Division Multiplexing) has been raised a new modulation technique. Due to its
advantages in multipath fading channel e.g. robust against ISI, ICI and some other advantages like best QoS for
multiple users, efficient usage of bandwidth it is suggested to be the modulation technique for next generation 4G
networks e.g. LTE. But along with all its advantages there are some disadvantages also e.g. High PAPR (Peak to
Average Power Ratio) at the transmitter end and BER (Bit Error Rate) at the receiving end. Since OFDM is only
used in the downlink of 4G networks. To reduce the problems of OFDM some techniques e.g. SLM, PTS,
Clipping, Coding, & Pre-coding etc are suggested but none of them is reduce the PAPR and BER to an
acceptable value. This Paper will discuss some techniques of PAPR & BER reduction, and their advantages and
disadvantages in detail.
KKEEYYWWOORRDDSS
PAPR, OFDM, SLM, DHT, DCT
FOR MORE DETAILS: https://wireilla.com/papers/ijmnct/V4N1/4114ijmnct01.pdf
VOLUME LINK: https://wireilla.com/ijmnct/vol4.html
13. REFERENCES
[1] Y.Wu and W. Y. Zou, "Orthogonal frequency division multiplexing: A multi-carrier modulation scheme,"
IEEE Trans. Consumer Electronics, vol. 42. no. 3, pp. 392-399, August 1995.
[2] W. Y. Zou and Y. Wu, "COFDM: An overview," IEEE Trans. Broadcasting, vol. 41 no.1, pp. 1-8, March
1995.
[3] JAE HONG LEE SEUNG HEE HAN, "AN OVERVIEW OF PEAK-TO-AVERAGE POWER RATIO
REDUCTION TECHNIQUES FOR MULTICARRIER TRANSMISSION," IEEE Wireless Communications,
pp. 56-65, April 2005.
[4] Yiyan Wu Tao Jiang, "An Overview: Peak-to-Average Power Ratio Reduction Techniques for OFDM
Signals," IEEE TRANSACTIONS ON BROADCASTING, VOL. 54, NO. 2, JUNE 2008, vol. 54, no.2, pp. 257-
268, June 2008.
[5] Jr L. J. Cimini, "Analysis and simulation of a digital mobile channel using orthogonal frequency division
multiplexing," IEEE Trans. Communication, vol. COM-33, no. 7, pp. 665-675, July 1985.
[6] Y. G. Li and G. Stüber, "Orthogonal Frequency Division Multiplexing for Wireless Communications,"
Boston, MA: Springer-Verlag, January 2006.
[7] Chenyang Yang,Gang Wu, Shaoqian Li, and Geoffrey Ye Li Taewon Hwang, "OFDM and Its Wireless
Applications: A Survey," IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, vol. 58, NO. 4, pp.
1673-1694, May 2009.
[8] R. O'Neill and L. B. Lopes, "Envelope Variations and Spectral Splatter in Clipped Multicarrier Signals ,"
IEEE Processing PIMRC 95 Toronto, Canada, pp. 71-75, September 1995.
[9] X. Li and Jr L. J. Cimini, "Effect of Clipping and Filtering on the Performance of OFDM," IEEE
Communication Letter, vol. 2, no. 5, pp. 131-133, May 1998.
[10] D. Kim and G. L. Stüber, "Clipping Noise Mitigation for OFDM by Decision–Aided Reconstruction," IEEE
Communication Letter, vol. 3, no. 1, pp. 4-6, January 1999.
[11] H. Saeedi, M. Sharif, and F. Marvasti, "Clipping Noise Cancellation in OFDM Systems Using Oversampled
Signal Reconstruction ," IEEE Communication Letter, vol. 6, no. 2, pp. 73-75, February 2002.
[12] Sungkeun Cha, Myonghee Park, Sungeun Lee, Keuk-Joon Bang, and Daesik Hong, "A new PAPR reduction
technique for OFDM systems using advanced peak windowing method," IEEE Transactions on Consumer
Electronics, , vol. 54, no. 2, pp. 405-410, May 2008.
[13] P. Foomooljareona nd W.A.C. Fernando, "PAPR Reduction in OFDM Systems," Thammasat Int. J. Sc.
Tech, vol. 7, no. 3, pp. 70-79, December 2002.
[14] Jiang Tao and Guangxi Zhu, "Nonlinear companding transform for reducing peak-to-average power ratio of
OFDM signals," IEEE Transactions on Broadcasting, vol. 50, no. 3, pp. 342-346, September
2004.
[15] N. Bouaynaya, and S. Mohan Y. Rahmatallah, "Bit error rate performance of linear companding transforms
for PAPR reduction in OFDM systems," in Proc. IEEE GLOBECOM, Houston, TX, USA, December 2011.
[16] Muller S. H. and Huber J. B, "A novel peak power reduction scheme for OFDM," the 8th IEEE International
Symposium on in Personal, Indoor and Mobile Radio Communications, 1997.
14. [17] M. Breiling, S.H. Muller-Weinfurtner, and J.B Huber, "SLM peak-power reduction without explicit side
information," IEEE Communications Letters, vol. 5, no. 6, pp. 239-241, June 2001.
[18] Chin-Liang Wang, Sheng-Ju Ku, and Chun-Ju Yang, "A Low-Complexity PAPR Estimation Scheme for
OFDM Signals and Its Application to SLM-Based PAPR Reduction," IEEE Journal of Selected Topics in Signal
Processing, vol. 4, no. 3, pp. 637-645, June 2010.
[19] S.H. Muller and J.B Huber, "OFDM with reduced peak-to-average power ratio by optimum combination of
partial transmit sequences," IEEE Electronics Letters , vol. 33, no. 5, pp. 368-369, February 1997.
[20] Han Seung Hee and Jae Hong Lee, "PAPR reduction of OFDM signals using a reduced complexity PTS
technique," IEEE Signal Processing Letters, vol. 11, no. 11, pp. 887-890, November 2004
.
[21] Dae-Woon Lim, Seok-Joong Heo, Jong-Seon No, and Habong Chung, "A new PTS OFDM scheme with
low complexity for PAPR reduction," IEEE Transactions on Broadcasting, vol. 52, no. 1, pp. 77- 82, March
2006.
[22] J. Tellado, "Peak to Average Power Reduction for Multicarrier Modulation," Ph.D. dissertation, Stanford
Univ, 2000.
[23] B. S. Krongold and D. L. Jones, "An Active Set Approach for OFDM PAR Reduction via Tone
Reservation," IEEE Transaction Signal Processing, vol. 52, no. 2, pp. 495-509, February 2004.
[24] D L Jones, "Peak power reduction in OFDM and DMT via active channel modification," in Proc. Asilomar
Conference on Signals, Systems, and Computers, vol. 2, pp. 1076-1079, 1999.
[25] B. S. Krongold and D. L. Jones, "PAR Reduction in OFDM via Active Constellation Extension," IEEE
Transaction on Broadcasting, vol. 49, no. 3, pp. 258-268, September 2003.
[26] S. Pino-Povedano and F.J Gonzalez-Serrano, "PAPR reduction for OFDM transmission using a method of
Convex Optimization and Amplitude Predistortion," International Workshop on Satellite and Space
Communications, IWSSC 2009, pp. 210-214, 9-11 September 2009.
[27] C. Nader, P. Handel, and N Bjorsell, "Peak-to-Average Power Reduction of OFDM Signals by Convex
Optimization: Experimental Validation and Performance Optimization," IEEE Transactions on Instrumentation
and Measurement, vol. 60, no. 2, pp. 473-479, February 2011.
[28] Lung-Sheng Tsai, Wei-Ho Chung, and Da-shan Shiu, "Lower Bounds on the Correlation Property for
OFDM Sequences with Spectral-Null Constraints," IEEE Transactions on Wireless Communications, vol. 10, no.
8, pp. 2652-2659, August 2011.
[29] J.A. Davis and J Jedwab, "Peak-to-mean power control and error correction for OFDM transmission using
Golay sequences and Reed-Muller codes," Electronics Letters, vol. 33, no. 4, pp. 267-268, February 1997.
[30] J.A. Davis and J Jedwab, "Peak-to-mean power control in OFDM, Golay complementary sequences, and
Reed-Muller codes," IEEE Transactions on Information Theory, vol. 45, no. 7, pp. 2397-2417, November 1999.
[31] Jiang Tao and Guangxi Zhu, "Complement block coding for reduction in peak-to-average power ratio of
OFDM signals," IEEE Communications Magazine, vol. 43, no. 9, pp. S17-S22, September 2005.
[32] Heeyoung Jun, Jaehee Cho, et.al Myonghee Park, "PAPR reduction in OFDM transmission using Hadamard
transform," ICC 2000, pp. 430-433, 2000.
[33] Xiang-Gen Xia, "Precoded and vector OFDM robust to channel spectral nulls and with reduced cyclic prefix
length in single transmit antenna systems," IEEE Transactions on Communications, vol. 49, no. 8, pp. 1363-
1374, August 2001.
15. [34] Yuan-Pei Lin and See-May Phoong, "BER minimized OFDM systems with channel independent precoders,"
IEEE Transactions on Signal Processing, vol. 51, no. 9, pp. 2369-2380, September 2003.
[35] Zhengdao Wang, Shengli Zhou, and G.B Giannakis, "Joint coding-precoding with low-complexity turbo-
decoding," IEEE Transactions on Wireless Communication, vol. 3, no. 3, pp. 832-842, May 2004.
[36] Yew Kuan Min, M. Drieberg, and V Jeoti, "On PAPR Reduction in OFDM Systems: A Technique using
Normalized Complex Hadamard Transform," IEEE Region TENCON 2005, pp. 1-4, 21-24 November 2005.
[37] I. Baig and V Jeoti, "PAPR analysis of DHT-precoded OFDM system for M-QAM," International
Conference on Intelligent and Advanced Systems (ICIAS), pp. 1-4, 15-17 June 2010.
[38] I. Baig and V Jeoti, "DCT precoded SLM technique for PAPR reduction in OFDM systems," International
Conference on Intelligent and Advanced Systems (ICIAS), 2010, pp. 1-6, 15-17 June 2010.
[39] I. Baig and V Jeoti, "PAPR Reduction in OFDM Systems: Zadoff-Chu Matrix Transform Based Pre/Post-
Coding Techniques," Second International Conference on Computational Intelligence, Communication Systems
and Networks (CICSyN), 2010, pp. 373-377, July 2010.
[40] A. Joshi, D. Bhardwaj, and D.S Saini, "PAPR reduction in OFDM with FEC (RS-CC and Turbo coding)
using DHT preceding," International Symposium on Instrumentation & Measurement, Sensor Network and
Automation (IMSNA), vol. 1, no. 1, pp. 14-18, 25-28 August 2012.
[41] N. Ahmed and K.R. Rao, "Orthogonal transforms for digital signal processing," Berlin: SpringerVerlag,
1975.
[42] R.N. Bracewell, "Discrete Hartley transform," Journal of the Optical Society of America, vol. 73, no. 12, pp.
1832-1835, 1983.
[43] B.M Popovic´, "Spreading sequences for multi-carrier CDMA systems," In IEE Colloquium CDMA
Techniques and Applications for Third Generation Mobile Systems, pp. 1-8, 1997.
[44] N. Ahmed, T. Natarajan, and K.R and Rao, "Discrete cosine transform," IEEE Transactions on Computers,
C-23(1), pp. 90-93, 1974.
16. Citation Count – 08
PERFORMANCE ANALYSIS ON THE BASIS OF A COMPARATIVE STUDY
BETWEEN MULTIPATH RAYLEIGH FADING AND AWGN CHANNEL IN THE
PRESENCE OF VARIOUS INTERFERENCE
Sutanu Ghosh
Dr. Sudhir Chandra Sur Degree Engineering College
AABBSSTTRRAACCTT
Interference is the most important issue for present wireless communication. There are various kinds of channel
used in wireless communication. Here I want to show a performance analysis on the basis of two different
channels – AWGN and Multipath Rayleigh fading channel. This is the comparative analysis with different kinds
of modulation techniques. Here I have also measured the Bit Error Rate with respect to different modulation
techniques and compare the rate in different channels. My objective is to compare the different characteristics of
the transmitter and receiver for different types of channels and modulators.
KKEEYYWWOORRDDSS
Rayleigh fading channel, Bit Error Rate, AWGN, Cellular Interference.
FOR MORE DETAILS: http://wireilla.com/papers/ijmnct/V4N1/4114ijmnct02.pdf
VOLUME LINK: https://wireilla.com/ijmnct/vol4.html
17. REFERENCES
[1] Cavers, James K. “An analysis of pilot symbol assisted modulation for Rayleigh fading channels [mobile
radio].” Vehicular Technology, IEEE Transactions on 40.4 (1991): 686-693
[2] Stein, Seymour. “Fading channel issues in system engineering.” Selected Areas in Communications, IEEE
Journal on 5.2 (1987): 68-89.
[3] Mishra, Ajay R. “Fundamentals of cellular network planning and optimisation: 2G/2.5 G/3G... evolution to
4G.”Wiley. com, 2004.
[4] Foschini, Gerard J. and Michael J. Gans. “On limits of wireless communications in a fading environment
when using multiple antennas.” Wireless personal communications 6.3 (1998): 311-335.
[5] Yang, Hong-Chuan and M-S. Alouini. "Closed-form formulas for the outage probability of wireless
communication systems with a minimum signal power constraint." Vehicular Technology, IEEE Transactions on
51.6 (2002): 1689-1698.
[6] T. S. Rappaport, Wireless Communications: Principles and Practice. N.J.: Prentice Hall, 1996.
[7] Petersen, B. R. and D. D. Falconer. "Exploiting cyclostationary subscriber-loop interference by equalization."
Global Telecommunications Conference, 1990, and Exhibition.'Communications: Connecting the Future',
GLOBECOM'90., IEEE. IEEE, 1990.
[8] Chen, S. and B. Mulgrew. "Overcoming co-channel interference using an adaptive radial basis function
equaliser." Signal Processing 28.1 (1992): 91-107.