SlideShare a Scribd company logo
1 of 10
Download to read offline
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013
DOI : 10.5121/ijnsa.2013.5606 65
Multi-carrier Equalization by Restoration of
RedundancY (MERRY) for Adaptive Channel
Shortening in Multi-carrier Systems
Samir Abd Elghafar1,2
, Salaheldin M. Diab1
, Bassiouny M. Sallam1
, Moawad I. Dessouky1
,
El-Sayed M. El-Rabaie1
, Fathi E. Abd El-Samie1
1Department of Electronics and Electrical Communications, Faculty of Electronic
Engineering, Menoufia University, Menouf, 32952, Egypt.
2Faculty of Engineering,
Department of Electrical Engineering,Jazan University,Jazan, Saudi Arabia
Abstract
This paper proposes a new blind adaptive channel shortening approach for multi-carrier systems. The
performance of the discrete Fourier transform-DMT (DFT-DMT) system is investigated with the proposed
DST-DMT system over the standard carrier serving area (CSA) loop1. Enhanced bit rates demonstrated
and less complexity also involved by the simulation of the DST-DMT system.
Keywords
DFT, DMT, DST.
1. INTRODUCTION
Multi carrier modulation, particularly Discrete Multi-tone (DMT) modulation, is one of the most
prominent modulation methods for high-speed digital communications. For the channel in the
DMT system separated into self- regulating sub-channels. The full amount of bits transmitted
over the channel would be the total amount of the bits transmitted in each sub-channel. The
binary input data are passed onto a set of parallel, independent sub-channels, each of which is
assigned a fixed number of bits during startup or system initialization. Given the measured SNR
of each sub-channel during startup, the number of bits for each sub-channel is then determined
[1]. Each sub-channel is encoded into a quadrature amplitude modulation (QAM) constellation of
the appropriate size. For example, if four bits are assigned to tone i, then tone i will use a 16-
QAM constellation for encoding. The modulation function, IFFT, converts the encoded binary
data in QAM constellation format from frequency domain to time domain for transmission .The
DMT demodulation regress the time domain signal back to frequency domain data.
A number of v samples is inserted as a guard period at the start of each DMT symbol of to
decrease inter-symbol interference (ISI) at v ≥ L-1, where L is the length of the channel. Inter-
carrier interference (ICI) can be reduced when the guard period is a cyclic prefix [2]. The guard
period reduces the channel throughput by a factor of N/ (N+ v), where N is both the symbol
length and FFT length. This factor decreases as v turns into large comparative to N, in order that
the presentation failure care for unreasonable. Hence, v is chosen to be relatively small compared
to N. In the field, however, ADSL and VDSL channel impulse responses can exceed N/16
samples [3].
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013
66
Time-domain equalizer (TEQ) is used for shortening. Accordingly, the DMT equalizer
construction consists of a flow of a single TEQ to shorten the L, a fast Fourier transform (FFT) to
present multi carrier demodulation, and a single-tap frequency-domain equalizer (FEQ) per tone to
correct frequency distortion in the shortened channel. Different DMT TEQ design methods
optimize FIR coefficients based on training data under different criteria. The method of Minimum
Mean Squared Error (MMSE) design is one of the beneficial methods [4,5,6,7] to minimize the
mean square error among the output of the route consisting of the channel and TEQ filter and the
output of a controlled rout consisting of a transmission delay  and a purpose filter. The method of
maximum shortening SNR (MSSNR) [3] deals with a challenge to reduce inter-symbol
interference (ISI) in the time domain. The MSSNR method aims at increasing the quotient of the
energy of the used channel impulse response within an object window of ν +1 samples to that
outer the object window. The Minimum-ISI (Min-ISI) method works by weighting the ISI in the
frequency domain [4], for example, to set the ISI in vacant and noisy sub-channels. The traditional
joint method of TEQ-FEQ structure equalizes all sub-channels that possibly bound bit rate
presentation. An alternate receiver architecture has been proposed in [8], in which to relocate the
TEQ procedures to the FEQ. The joint TEQ-FEQ would provide a multi-tap FEQ where each sub-
channel is discretely equalized. Another alternative structure has been proposed in [9], in which
the authors proposed the FEQ transfer to the TEQ to give up complex-valued time-domain
equalizer filter banks. Joint equalization methods give up higher data rates for the downstream
ADSL task [10].
Multi-carrier modulation (MCM) techniques including discrete multi-tone (DMT) and orthogonal
frequency division multiplexing (OFDM) have been used extensively in many wireless network
standards, such as IEEE 802.1 la, IEEE 802.16a, and wire-line digital communication systems,
such as (ADSL) [11,12,13]. MCMs based on discrete Fourier transform (DFT). They utilize the
complex exponential functions group such as orthogonal source. Particularly, in discrete multi-
tone (DMT) systems, modulation by the IFFT and demodulation by the FFT create orthogonal
sub-channels [14]. But, the exponential functions are not the rare orthogonal source so as to
construct baseband multicarrier signals. A single trigonometric function can be used to perform as
an orthogonal source to apply to the MCM system, and this system can be synthesized using a
discrete sine transform (DST) [12].
TEQ design methods have more complications, and need a channel approximation. The proposed
algorithm in [15] which is a blind adaptive channel shortening algorithm solves the complexity
problem. This algorithm has low complexity and is globally convergent with only a small loss in
bit rate [15]. So in this paper, we can use the DST; along with its inverse as a replacement for the
inverse fast Fourier transform / fast Fourier transform (IFFT/FFT) stages in DMT systems in
order to enhance the performance of the algorithm in [15] and achieve a higher bit rate with low
complexity.
2. Scheme Design
The scheme design is shown in Figure 1. Every one of the N frequency bins is modulated by a
QAM signal, while frequently a number of bins are left as unacceptable carriers [4]. Modulation
is performed via an IFFT, and demodulation is accomplished via FFT. The TEQ is used to
decrease the channel length, and the follow-on reduced efficient channel is matched by a
frequency-domain equalizer (FEQ).
International Journal of Network Security  Its Applications (IJNSA), Vol.5, No.6, November 2013
67
Figure 1 . DFT system model. IFFT: modulation, parallel to serial (P/S), add cyclic prefix (CP), eliminate
cyclic prefix (xCP) and FFT demodulation.
For the conventional DFT-DMT system, the channel input sequence [ fft
n
x , ] at the output of the
IFFT block can be presented as [16]
1
,
,
1
,
0
,
1 1
0
2
, −
=
⋅
⋅
= ∑
−
=
N
n
e
X
N
x
N
b
N
bn
j
b
fft
n K
π
(1)
where b
X is the encoded bit stream.
When adding the CP, the end v samples are identical to the first v samples in the symbol, i.e.
{ }
v
i
N
i
Mk
x
i
Mk
x ,
,
1
),
(
)
( L
∈
+
+
=
+ (2)
The symbol period is M = N + v and k is the symbol index. Figure 2 shows an example of this,
with N = 8, v= 2, and M = N + v = 10, and the symbol pictured is for k = 0. The received data r is
obtained from x by
)
(
)
(
)
(
)
(
0
i
Mk
n
l
i
Mk
x
l
i
Mk
r
h
L
l
+
+
−
+
⋅
=
+ ∑
=
h (3)
International Journal of Network Security  Its Applications (IJNSA), Vol.5, No.6, November 2013
68
Figure 2 . Demonstration of the change in the ISI at the end of the received symbol
and at the received CP .
and the equalized data y is obtained from r by
)
(
)
(
)
(
0
∑
=
−
+
⋅
=
+
w
L
j
j
i
Mk
r
j
i
Mk
y w (4)
The channel has 1
+
h
L taps, the TEQ has 1
+
w
L taps and the effective channel w
h
c ∗
= has
1
+
c
L taps, where w
h
c L
L
L +
= .
3. Description algorithm of MERRY
Consider the example in Figure 2. The broadcasted samples 2 and 10 are the same. But, at the
receiver, the interfering samples earlier than sample 2 are not the whole identical to their
correspondences before sample 10. If ( ),
2
h ( )
3
h and ( )
4
h were zero, then ( ) ( )
10
2 r
r = . If we
try to force ( ) ( )
10
2 r
r = , we may force ( )
2
h = ( )
3
h = ( )
4
h = 0, forcing the channel selected the
same like the CP. The location of the window of v non-zero taps can be varied by comparing
( )
3
r to ( )
11
r , or ( )
4
r to ( )
12
r , etc. In general, if the channel length v
Lh ≤
+1 , in that case the
previous sample inside the CP must look like the previous sample inside the symbol. Unit cost
function that reproduce:
( ) ( )
[ ] { }
1
,
,
0
,
2
−
∈
∆
∆
+
+
+
−
∆
+
+
=
∆ M
N
v
Mk
y
v
Mk
y
E
J L (5)
where ∆ is the sign synchronization parameter, which correspond to the preferred delay of the
channel-TEQ collection. The choice of ∆ affects the cost function.
A randomization gradient descent of Eq.(5) guides to a sightless, adaptive TEQ, because the
broadcasted data not require be identified. The proposed MERRY algorithm performs a
randomization gradient descent of Eq.(5), with a limitation to keep away from the slight solution
w = 0. The MERRY algorithm is summarized as follows:
For symbol ,
,
2
,
1
,
0 L
=
k
International Journal of Network Security  Its Applications (IJNSA), Vol.5, No.6, November 2013
69
( ) ( ) ( )
∆
+
+
+
−
∆
+
+
= N
v
Mk
r
v
Mk
r
k
r
~ (6)
( ) ( ) ( )
k
r
k
w
k
e T ~
= (7)
( ) ( ) ( ) ( )
k
r
k
e
k
w
k
w ∗
−
=
+ ~
1
~ µ (8)
( ) ( )
( )
1
~
1
~
1
+
+
=
+
k
w
k
w
k
w (9)
where ( ) ( ) ( )
[ ]T
w
L
i
r
i
r
i
r
i
r )
(
,
,
1
, −
−
= L , and ∗ denotes complex conjugation.
Due to the fact that MERRY compares with CP at the last part of the symbol, one update is
achievable for each symbol. Interchanging applications of the limitation have set up one tap to
unity, retaining a channel approximation and renormalizing to enforce 1
c = instead of 1
w = ,
or with a retribution term in the cost function to put into effect the norm limitation.
4. DST Implementation
Applying the above algorithm to the DST approach solves the complexity problem and achieves
higher bit rates than the DFT system.
For the proposed DST-DMT system, the channel input sequence { DST
n
x , } at the output of the
IDST block can be presented as [17]
( ) 1
,
,
1
,
0
,
1
2
2
sin
2 1
0
2
1
, −
=






+
⋅
⋅
⋅






= ∑
−
=
N
n
n
N
b
X
A
N
x b
N
b
b
DST
n L
π
(10)
where





=
=
otherwise
b
for
Ab
1
0
2
1
(11)
, and b
X is the encoded bit stream.
)
(
)
(
)
(
)
(
0
i
Mk
n
l
i
Mk
x
l
i
Mk
r
h
L
l
DST
DST +
+
−
+
⋅
=
+ ∑
=
h
)
(
)
(
)
(
0
∑
=
−
+
⋅
=
+
w
L
j
DST
DST j
i
Mk
r
j
i
Mk
y w
International Journal of Network Security  Its Applications (IJNSA), Vol.5, No.6, November 2013
70
Figure 3 DST system model.
It is known that the DST has excellent spectral compaction and energy concentration properties
(See Fig.(3)). It uses only real arithmetics as opposed to the complex-valued DFT. This reduces
the signal processing complexity especially for real pulse-amplitude modulation signaling, where
DFT-based processing still uses complex arithmetics and suffers from in-phase/quadrature
imbalance problems which can cause appreciable performance degradation [11-18].
The cost function in Eq. (5) can be rewritten as:
( ) ( )
[ ] { }
1
,
,
0
,
2
, −
∈
∆
∆
+
+
+
−
∆
+
+
=
∆ M
N
v
Mk
y
v
Mk
y
E
J DST
DST
DST L (12)
The MERRY algorithm can be rewritten as:
For symbol ,
,
2
,
1
,
0 L
=
k
( ) ( ) ( )
∆
+
+
+
−
∆
+
+
= N
v
Mk
r
v
Mk
r
k
r DST
DST
DST
~ (13)
( ) ( ) ( )
k
r
k
w
k
e DST
T
DST
DST
~
= (14)
( ) ( ) ( ) ( )
k
r
k
e
k
w
k
w DST
DST
DST
DST
∗
−
=
+ ~
1
~ µ (15)
( ) ( )
( )
1
~
1
~
1
+
+
=
+
k
w
k
w
k
w
DST
DST
DST (16)
where ( ) ( ) ( )
[ ]T
w
DST
DST
DST
DST L
i
r
i
r
i
r
i
r )
(
,
,
1
, −
−
= L , and ∗ denotes complex conjugation.
5. Simulation parameters
We use the standard carrier-serving-area (CSA) loop1 [15] as our test channel. The channel
impulse response consists of 512 samples sampled at a rate of 2.208 MHz. Also employ high pass
filter at cutoff frequency of 5.4 kHz and pass band ripple of 0.5 dB to the standard loop1 to add
the outcome of the splitter by the side of the transmitter. The DC channel (channel 0), channels 1-
5, and the Nyquist channel are not used. The DSL presentation metric is the possible bit rate for a
fixed probability of error,
IDST
DST
DST
DST
International Journal of Network Security  Its Applications (IJNSA), Vol.5, No.6, November 2013
71
∑ 





Γ
+
=
i
i
SNR
B 1
ln (17)
When dB
SNRi 40
= in frequency bin i , and Γ is the SNR gap ( Γ =9.8 + 6 - 4.2 = 11.6 dB).
This corresponds to a system margin of 6 dB and a coding gain of 4.2 dB. Both the FFT size and
the DST size are set to 512
=
N . We assume that the power allocation is constant over all used
sub-channels and that it is not changed after the TEQ is placed into the system.
6. Simulation Results
A- for DFT Approach
Figure 4 shows simulation results using CSA loop1. The CP size is 32. The FFT length is 512.
We have 16 taps for the TEQ. Figure 5 demonstrates a plan for bit rate opposed versus SNR. The
Bit rate for this plot was computed by running for 5000 symbols and gradually decreasing the step
size over time. For all these SNR values, MERRY approaches the max SSNR solution.
Figure 4. Achievable bit rate vs. time for the DFT system.
International Journal of Network Security  Its Applications (IJNSA), Vol.5, No.6, November 2013
72
Figure 5 Achievable bit rate vs. SNR for the DFT system.
B- DST System Results
As compared to figure 4 for the DFT approach, figure 6 shows the achievable bit rate vs.
time for the DST approach at the same simulation parameters. As we can see in the case
of DST approach, the performance is better (high bit rate and low complexity) than that
of the DFT approach.
Also, when comparing figure 5 for the DFT approach with figure 7 for the DST approach,
we can see that the DST approach provides a higher bit rate than the DFT approach at the
same SNR values.
International Journal of Network Security  Its Applications (IJNSA), Vol.5, No.6, November 2013
73
Figure 6 Achievable bit rate vs. time for the DST system.
Figure 7 Achievable bit rate vs. SNR for the DST system.
International Journal of Network Security  Its Applications (IJNSA), Vol.5, No.6, November 2013
74
8. Conclusions
The proposed IDST/DST has been used for modulation /demodulation stages in DMT systems.
Our simulation results show that the DST-DMT system provides a better performance than the
DFT-DMT system because of the excellent spectral compaction and energy concentration
properties of the DST compared to the DFT. It was concluded that the proposed DST-DMT
system achieves higher bit rates as compared with the conventional DFT-DMT system.
References
[1] I. Lee, J. S. Chow, and J. M. Cioffi, Performance evaluation of a fast computation algorithm for the
DMT in high-speed subscriber loop, IEEE J. on Selected Areas in Comm., vol. 13, pp. 1564-1570,
Dec. 1995.
[2] K. Vanble, M. Moonen, and G. Leus, “Linear and Decision-Feedback Per Tone Equalization for
DMT-Based Transmission Over IIR Channels,” I IEEE Transactions Signal Processing, vol. 54, no. 1,
Jan. 2006.
[3] G. Arslan, B. Lu, L. D. Clark, and B. L. Evans, Iterative Refinement Methods for Time-Domain
Equalizer Design, EURASIP Journal on Applied Signal Processing vol. 2006, pp.1–12, Aug. 2005.
[4] G. Arslan, B. L. Evans, and S. Kiaei, “Equalization for Discrete Multitone Transceivers to Maximize
Bit Rate,” IEEE Transactions Signal Processing, vol. 49, no. 12, pp. 3123–3135, 2001.
[5] J. S. Chow and J. M. Cioffi, A cost-effective maximum likelihood receiver for June multicarrier
systems, in Proc. IEEE Int. Conf. Comm., vol. 2, (Chicago, IL), pp. 948- 952,1992.
[6] J. S. Chow, J. M. Cioffi, and J. A. Bingham, Equalizer training algorithms for multicarrier
modulation systems, in Proc. IEEE Int. Conf. Comm., vol. 2, (Geneva, Switzerland), pp. 761-765,
May 1993.
[7] N. Al-Dhahir and J. M. Cioffi, Efficiently computed reduced-parameter input-aided MMSE
equalizers for ML detection: A unified approach, IEEE Trans. on Info. Theory,vol. 42, pp. 903-915,
May 1996
[8] K. Van Acker, G. Leus, M. Moonen, O. van de Wiel, and T. Pollet, “Per Tone no.1, pp. Equalization
for DMT-based Systems,” IEEE Transactions on Communications, vol. 49,109–119, 2001.
[9] M. Ding, Z. Shen, and B. L. Evans, “An Achievable Performance Upper Bound for Discrete Multi
Tone Equalization,” in Proceedings of IEEE Global Telecommunications Conference (GLOBECOM
’04), vol. 4, pp. 2297–2301, Dallas, Tex, USA, November–December 2004.
[10] R. K. Martin, K. Vanbleu, M. Ding, et al., “Unification and Evaluation of Equalization Structures and
Design Algorithms for Discrete Multi-tone Modulation Systems,” IEEE Transactions Signal
Processing, vol. 53, no. 10, part 1, pp. 3880–3894, 2005. [11] A. Rushdi and J. Tuqan, PAPR
Reduction in Trigonometric-Based OFDM Systems, IEEE Signals, Systems and Computers,
Conference Record of the Forty-First Asiloma Conference pp.1747–1751, Nov. 2007.
[12] P. Tan, and N. C. Beaulieu, A Comparison of DCT-Based OFDM and DFT-Based OFDM in
Frequency Offset and Fading Channels, IEEE Transactions on Communications, vol. 54, no. 11, pp.
2113–2125, Nov. 2006.
[13] P. Tan, and N. C. Beaulieu, An Improved DCT-Based OFDM Data Transmission Scheme, Personal,
Indoor and Mobile Radio Communications, IEEE 16th International Symposium, pp.745–749, Sept.
2005.
[14] E. Khan, and C. Heneghan, Iterative Refinement Methods for Time-Domain Equalizer Design,
International Journal of Signal Processing, pp.126–130, 2006.
[15] R. K. Martin, J. Balakrishnan, W. A. Sethares, and C. R. Johnson, Jr., “A Blind, Adaptive TEQ for
Multicarrier Systems, IEEE Signal Processing Letters, vol. 9, no. 11, pp. 341{343, Nov. 2002.
[16] A.-Y. Wu T.-S. Chan, Cost-efficient Parallel Lattice VLSI Architecture for the IFFT/FFT in DMT
Transceiver Technology, IEEE, pp. 3517-3520, 1998.
[17] A. B. Watson, Image Compression Using the Discrete Cosine Transform, Mathematica Journal,
4(1), 1994, p. 81-88.
[18] P. Tan, N. C. Beaulieu, “A Comparison of DCT-Based OFDM and DFT-Based OFDM in frequency
offset and fading channels,” IEEE Trans. On Commun., vol. 54, no. 11, Nov.2006.

More Related Content

What's hot (20)

Dynamic&p t-logic
Dynamic&p t-logicDynamic&p t-logic
Dynamic&p t-logic
 
Combinational Logic
Combinational LogicCombinational Logic
Combinational Logic
 
NMOS PPT for 2nd year
NMOS PPT for 2nd yearNMOS PPT for 2nd year
NMOS PPT for 2nd year
 
Dee 6113 CMOS IC DESIGN (Chapter 3 ~ CMOS inverter)
Dee 6113 CMOS IC DESIGN (Chapter 3 ~ CMOS inverter)Dee 6113 CMOS IC DESIGN (Chapter 3 ~ CMOS inverter)
Dee 6113 CMOS IC DESIGN (Chapter 3 ~ CMOS inverter)
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
CMOS Topic 5 -_cmos_inverter
CMOS Topic 5 -_cmos_inverterCMOS Topic 5 -_cmos_inverter
CMOS Topic 5 -_cmos_inverter
 
Unit 3 testing of logic circuits
Unit 3 testing of logic circuitsUnit 3 testing of logic circuits
Unit 3 testing of logic circuits
 
Logic Gate
Logic GateLogic Gate
Logic Gate
 
CMOS
CMOS CMOS
CMOS
 
Low Power Design - PPT 1
Low Power Design - PPT 1 Low Power Design - PPT 1
Low Power Design - PPT 1
 
Pass Transistor Logic
Pass Transistor LogicPass Transistor Logic
Pass Transistor Logic
 
mos transistor
mos transistormos transistor
mos transistor
 
Mosfet’s
Mosfet’sMosfet’s
Mosfet’s
 
Unit 3
Unit 3Unit 3
Unit 3
 
Emosfet slides....
Emosfet slides....Emosfet slides....
Emosfet slides....
 
Mos and cmos technology
Mos and cmos technologyMos and cmos technology
Mos and cmos technology
 
Project mac
Project macProject mac
Project mac
 
Vlsi design mosfet
Vlsi design mosfetVlsi design mosfet
Vlsi design mosfet
 
Lec17 mosfet iv
Lec17 mosfet ivLec17 mosfet iv
Lec17 mosfet iv
 
EE20-Chapter 5
EE20-Chapter 5 EE20-Chapter 5
EE20-Chapter 5
 

Similar to Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive Channel Shortening in Multi-carrier Systems

Multi carrier equalization by restoration of redundanc y (merry) for adaptive...
Multi carrier equalization by restoration of redundanc y (merry) for adaptive...Multi carrier equalization by restoration of redundanc y (merry) for adaptive...
Multi carrier equalization by restoration of redundanc y (merry) for adaptive...IJNSA Journal
 
A blind channel shortening for multiuser, multicarrier CDMA system over multi...
A blind channel shortening for multiuser, multicarrier CDMA system over multi...A blind channel shortening for multiuser, multicarrier CDMA system over multi...
A blind channel shortening for multiuser, multicarrier CDMA system over multi...TELKOMNIKA JOURNAL
 
An identification of the tolerable time-interleaved analog-todigital convert...
An identification of the tolerable time-interleaved analog-todigital convert...An identification of the tolerable time-interleaved analog-todigital convert...
An identification of the tolerable time-interleaved analog-todigital convert...IJECEIAES
 
IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...
IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...
IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...IJCNCJournal
 
Analysis of cyclic prefix length effect on ISI limitation in OFDM system over...
Analysis of cyclic prefix length effect on ISI limitation in OFDM system over...Analysis of cyclic prefix length effect on ISI limitation in OFDM system over...
Analysis of cyclic prefix length effect on ISI limitation in OFDM system over...IJECEIAES
 
CS Based Channel Estimation for OFDM Systems under Long Delay Channels Using ...
CS Based Channel Estimation for OFDM Systems under Long Delay Channels Using ...CS Based Channel Estimation for OFDM Systems under Long Delay Channels Using ...
CS Based Channel Estimation for OFDM Systems under Long Delay Channels Using ...IJERA Editor
 
Classical Discrete-Time Fourier TransformBased Channel Estimation for MIMO-OF...
Classical Discrete-Time Fourier TransformBased Channel Estimation for MIMO-OF...Classical Discrete-Time Fourier TransformBased Channel Estimation for MIMO-OF...
Classical Discrete-Time Fourier TransformBased Channel Estimation for MIMO-OF...IJCSEA Journal
 
Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...
Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...
Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...IOSRJVSP
 
Design Ofdm System And Remove Nonlinear Distortion In OFDM Signal At Transmit...
Design Ofdm System And Remove Nonlinear Distortion In OFDM Signal At Transmit...Design Ofdm System And Remove Nonlinear Distortion In OFDM Signal At Transmit...
Design Ofdm System And Remove Nonlinear Distortion In OFDM Signal At Transmit...Rupesh Sharma
 
Analysis of Peak to Average Power Ratio Reduction Techniques in Sfbc Ofdm System
Analysis of Peak to Average Power Ratio Reduction Techniques in Sfbc Ofdm SystemAnalysis of Peak to Average Power Ratio Reduction Techniques in Sfbc Ofdm System
Analysis of Peak to Average Power Ratio Reduction Techniques in Sfbc Ofdm SystemIOSR Journals
 
Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...
Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...
Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...IJERA Editor
 
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...ijcnac
 
NEW BER ANALYSIS OF OFDM SYSTEM OVER NAKAGAMI-n (RICE) FADING CHANNEL
NEW BER ANALYSIS OF OFDM SYSTEM OVER NAKAGAMI-n (RICE) FADING CHANNELNEW BER ANALYSIS OF OFDM SYSTEM OVER NAKAGAMI-n (RICE) FADING CHANNEL
NEW BER ANALYSIS OF OFDM SYSTEM OVER NAKAGAMI-n (RICE) FADING CHANNELijcseit
 
Design and Fabrication of a Two Axis Parabolic Solar Dish Collector
Design and Fabrication of a Two Axis Parabolic Solar Dish CollectorDesign and Fabrication of a Two Axis Parabolic Solar Dish Collector
Design and Fabrication of a Two Axis Parabolic Solar Dish CollectorIJERA Editor
 
Simulation of OFDM modulation
Simulation of OFDM modulationSimulation of OFDM modulation
Simulation of OFDM modulationDawood Aqlan
 
Simulation of ofdm modulation adapted to the transmission of a fixed image
Simulation of ofdm modulation adapted to the transmission of a fixed imageSimulation of ofdm modulation adapted to the transmission of a fixed image
Simulation of ofdm modulation adapted to the transmission of a fixed imageIAEME Publication
 
Pilot based channel estimation improvement in orthogonal frequency-division m...
Pilot based channel estimation improvement in orthogonal frequency-division m...Pilot based channel estimation improvement in orthogonal frequency-division m...
Pilot based channel estimation improvement in orthogonal frequency-division m...IJECEIAES
 
Improved Timing Estimation Using Iterative Normalization Technique for OFDM S...
Improved Timing Estimation Using Iterative Normalization Technique for OFDM S...Improved Timing Estimation Using Iterative Normalization Technique for OFDM S...
Improved Timing Estimation Using Iterative Normalization Technique for OFDM S...IJECEIAES
 
System performance evaluation of fixed and adaptive resource allocation of 3 ...
System performance evaluation of fixed and adaptive resource allocation of 3 ...System performance evaluation of fixed and adaptive resource allocation of 3 ...
System performance evaluation of fixed and adaptive resource allocation of 3 ...Alexander Decker
 
Performance evaluation on the basis of bit error rate for different order of ...
Performance evaluation on the basis of bit error rate for different order of ...Performance evaluation on the basis of bit error rate for different order of ...
Performance evaluation on the basis of bit error rate for different order of ...ijmnct
 

Similar to Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive Channel Shortening in Multi-carrier Systems (20)

Multi carrier equalization by restoration of redundanc y (merry) for adaptive...
Multi carrier equalization by restoration of redundanc y (merry) for adaptive...Multi carrier equalization by restoration of redundanc y (merry) for adaptive...
Multi carrier equalization by restoration of redundanc y (merry) for adaptive...
 
A blind channel shortening for multiuser, multicarrier CDMA system over multi...
A blind channel shortening for multiuser, multicarrier CDMA system over multi...A blind channel shortening for multiuser, multicarrier CDMA system over multi...
A blind channel shortening for multiuser, multicarrier CDMA system over multi...
 
An identification of the tolerable time-interleaved analog-todigital convert...
An identification of the tolerable time-interleaved analog-todigital convert...An identification of the tolerable time-interleaved analog-todigital convert...
An identification of the tolerable time-interleaved analog-todigital convert...
 
IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...
IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...
IMPROVEMENT OF LTE DOWNLINK SYSTEM PERFORMANCES USING THE LAGRANGE POLYNOMIAL...
 
Analysis of cyclic prefix length effect on ISI limitation in OFDM system over...
Analysis of cyclic prefix length effect on ISI limitation in OFDM system over...Analysis of cyclic prefix length effect on ISI limitation in OFDM system over...
Analysis of cyclic prefix length effect on ISI limitation in OFDM system over...
 
CS Based Channel Estimation for OFDM Systems under Long Delay Channels Using ...
CS Based Channel Estimation for OFDM Systems under Long Delay Channels Using ...CS Based Channel Estimation for OFDM Systems under Long Delay Channels Using ...
CS Based Channel Estimation for OFDM Systems under Long Delay Channels Using ...
 
Classical Discrete-Time Fourier TransformBased Channel Estimation for MIMO-OF...
Classical Discrete-Time Fourier TransformBased Channel Estimation for MIMO-OF...Classical Discrete-Time Fourier TransformBased Channel Estimation for MIMO-OF...
Classical Discrete-Time Fourier TransformBased Channel Estimation for MIMO-OF...
 
Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...
Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...
Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...
 
Design Ofdm System And Remove Nonlinear Distortion In OFDM Signal At Transmit...
Design Ofdm System And Remove Nonlinear Distortion In OFDM Signal At Transmit...Design Ofdm System And Remove Nonlinear Distortion In OFDM Signal At Transmit...
Design Ofdm System And Remove Nonlinear Distortion In OFDM Signal At Transmit...
 
Analysis of Peak to Average Power Ratio Reduction Techniques in Sfbc Ofdm System
Analysis of Peak to Average Power Ratio Reduction Techniques in Sfbc Ofdm SystemAnalysis of Peak to Average Power Ratio Reduction Techniques in Sfbc Ofdm System
Analysis of Peak to Average Power Ratio Reduction Techniques in Sfbc Ofdm System
 
Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...
Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...
Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...
 
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...
 
NEW BER ANALYSIS OF OFDM SYSTEM OVER NAKAGAMI-n (RICE) FADING CHANNEL
NEW BER ANALYSIS OF OFDM SYSTEM OVER NAKAGAMI-n (RICE) FADING CHANNELNEW BER ANALYSIS OF OFDM SYSTEM OVER NAKAGAMI-n (RICE) FADING CHANNEL
NEW BER ANALYSIS OF OFDM SYSTEM OVER NAKAGAMI-n (RICE) FADING CHANNEL
 
Design and Fabrication of a Two Axis Parabolic Solar Dish Collector
Design and Fabrication of a Two Axis Parabolic Solar Dish CollectorDesign and Fabrication of a Two Axis Parabolic Solar Dish Collector
Design and Fabrication of a Two Axis Parabolic Solar Dish Collector
 
Simulation of OFDM modulation
Simulation of OFDM modulationSimulation of OFDM modulation
Simulation of OFDM modulation
 
Simulation of ofdm modulation adapted to the transmission of a fixed image
Simulation of ofdm modulation adapted to the transmission of a fixed imageSimulation of ofdm modulation adapted to the transmission of a fixed image
Simulation of ofdm modulation adapted to the transmission of a fixed image
 
Pilot based channel estimation improvement in orthogonal frequency-division m...
Pilot based channel estimation improvement in orthogonal frequency-division m...Pilot based channel estimation improvement in orthogonal frequency-division m...
Pilot based channel estimation improvement in orthogonal frequency-division m...
 
Improved Timing Estimation Using Iterative Normalization Technique for OFDM S...
Improved Timing Estimation Using Iterative Normalization Technique for OFDM S...Improved Timing Estimation Using Iterative Normalization Technique for OFDM S...
Improved Timing Estimation Using Iterative Normalization Technique for OFDM S...
 
System performance evaluation of fixed and adaptive resource allocation of 3 ...
System performance evaluation of fixed and adaptive resource allocation of 3 ...System performance evaluation of fixed and adaptive resource allocation of 3 ...
System performance evaluation of fixed and adaptive resource allocation of 3 ...
 
Performance evaluation on the basis of bit error rate for different order of ...
Performance evaluation on the basis of bit error rate for different order of ...Performance evaluation on the basis of bit error rate for different order of ...
Performance evaluation on the basis of bit error rate for different order of ...
 

Recently uploaded

Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 

Recently uploaded (20)

Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 

Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive Channel Shortening in Multi-carrier Systems

  • 1. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 DOI : 10.5121/ijnsa.2013.5606 65 Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive Channel Shortening in Multi-carrier Systems Samir Abd Elghafar1,2 , Salaheldin M. Diab1 , Bassiouny M. Sallam1 , Moawad I. Dessouky1 , El-Sayed M. El-Rabaie1 , Fathi E. Abd El-Samie1 1Department of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University, Menouf, 32952, Egypt. 2Faculty of Engineering, Department of Electrical Engineering,Jazan University,Jazan, Saudi Arabia Abstract This paper proposes a new blind adaptive channel shortening approach for multi-carrier systems. The performance of the discrete Fourier transform-DMT (DFT-DMT) system is investigated with the proposed DST-DMT system over the standard carrier serving area (CSA) loop1. Enhanced bit rates demonstrated and less complexity also involved by the simulation of the DST-DMT system. Keywords DFT, DMT, DST. 1. INTRODUCTION Multi carrier modulation, particularly Discrete Multi-tone (DMT) modulation, is one of the most prominent modulation methods for high-speed digital communications. For the channel in the DMT system separated into self- regulating sub-channels. The full amount of bits transmitted over the channel would be the total amount of the bits transmitted in each sub-channel. The binary input data are passed onto a set of parallel, independent sub-channels, each of which is assigned a fixed number of bits during startup or system initialization. Given the measured SNR of each sub-channel during startup, the number of bits for each sub-channel is then determined [1]. Each sub-channel is encoded into a quadrature amplitude modulation (QAM) constellation of the appropriate size. For example, if four bits are assigned to tone i, then tone i will use a 16- QAM constellation for encoding. The modulation function, IFFT, converts the encoded binary data in QAM constellation format from frequency domain to time domain for transmission .The DMT demodulation regress the time domain signal back to frequency domain data. A number of v samples is inserted as a guard period at the start of each DMT symbol of to decrease inter-symbol interference (ISI) at v ≥ L-1, where L is the length of the channel. Inter- carrier interference (ICI) can be reduced when the guard period is a cyclic prefix [2]. The guard period reduces the channel throughput by a factor of N/ (N+ v), where N is both the symbol length and FFT length. This factor decreases as v turns into large comparative to N, in order that the presentation failure care for unreasonable. Hence, v is chosen to be relatively small compared to N. In the field, however, ADSL and VDSL channel impulse responses can exceed N/16 samples [3].
  • 2. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 66 Time-domain equalizer (TEQ) is used for shortening. Accordingly, the DMT equalizer construction consists of a flow of a single TEQ to shorten the L, a fast Fourier transform (FFT) to present multi carrier demodulation, and a single-tap frequency-domain equalizer (FEQ) per tone to correct frequency distortion in the shortened channel. Different DMT TEQ design methods optimize FIR coefficients based on training data under different criteria. The method of Minimum Mean Squared Error (MMSE) design is one of the beneficial methods [4,5,6,7] to minimize the mean square error among the output of the route consisting of the channel and TEQ filter and the output of a controlled rout consisting of a transmission delay and a purpose filter. The method of maximum shortening SNR (MSSNR) [3] deals with a challenge to reduce inter-symbol interference (ISI) in the time domain. The MSSNR method aims at increasing the quotient of the energy of the used channel impulse response within an object window of ν +1 samples to that outer the object window. The Minimum-ISI (Min-ISI) method works by weighting the ISI in the frequency domain [4], for example, to set the ISI in vacant and noisy sub-channels. The traditional joint method of TEQ-FEQ structure equalizes all sub-channels that possibly bound bit rate presentation. An alternate receiver architecture has been proposed in [8], in which to relocate the TEQ procedures to the FEQ. The joint TEQ-FEQ would provide a multi-tap FEQ where each sub- channel is discretely equalized. Another alternative structure has been proposed in [9], in which the authors proposed the FEQ transfer to the TEQ to give up complex-valued time-domain equalizer filter banks. Joint equalization methods give up higher data rates for the downstream ADSL task [10]. Multi-carrier modulation (MCM) techniques including discrete multi-tone (DMT) and orthogonal frequency division multiplexing (OFDM) have been used extensively in many wireless network standards, such as IEEE 802.1 la, IEEE 802.16a, and wire-line digital communication systems, such as (ADSL) [11,12,13]. MCMs based on discrete Fourier transform (DFT). They utilize the complex exponential functions group such as orthogonal source. Particularly, in discrete multi- tone (DMT) systems, modulation by the IFFT and demodulation by the FFT create orthogonal sub-channels [14]. But, the exponential functions are not the rare orthogonal source so as to construct baseband multicarrier signals. A single trigonometric function can be used to perform as an orthogonal source to apply to the MCM system, and this system can be synthesized using a discrete sine transform (DST) [12]. TEQ design methods have more complications, and need a channel approximation. The proposed algorithm in [15] which is a blind adaptive channel shortening algorithm solves the complexity problem. This algorithm has low complexity and is globally convergent with only a small loss in bit rate [15]. So in this paper, we can use the DST; along with its inverse as a replacement for the inverse fast Fourier transform / fast Fourier transform (IFFT/FFT) stages in DMT systems in order to enhance the performance of the algorithm in [15] and achieve a higher bit rate with low complexity. 2. Scheme Design The scheme design is shown in Figure 1. Every one of the N frequency bins is modulated by a QAM signal, while frequently a number of bins are left as unacceptable carriers [4]. Modulation is performed via an IFFT, and demodulation is accomplished via FFT. The TEQ is used to decrease the channel length, and the follow-on reduced efficient channel is matched by a frequency-domain equalizer (FEQ).
  • 3. International Journal of Network Security Its Applications (IJNSA), Vol.5, No.6, November 2013 67 Figure 1 . DFT system model. IFFT: modulation, parallel to serial (P/S), add cyclic prefix (CP), eliminate cyclic prefix (xCP) and FFT demodulation. For the conventional DFT-DMT system, the channel input sequence [ fft n x , ] at the output of the IFFT block can be presented as [16] 1 , , 1 , 0 , 1 1 0 2 , − = ⋅ ⋅ = ∑ − = N n e X N x N b N bn j b fft n K π (1) where b X is the encoded bit stream. When adding the CP, the end v samples are identical to the first v samples in the symbol, i.e. { } v i N i Mk x i Mk x , , 1 ), ( ) ( L ∈ + + = + (2) The symbol period is M = N + v and k is the symbol index. Figure 2 shows an example of this, with N = 8, v= 2, and M = N + v = 10, and the symbol pictured is for k = 0. The received data r is obtained from x by ) ( ) ( ) ( ) ( 0 i Mk n l i Mk x l i Mk r h L l + + − + ⋅ = + ∑ = h (3)
  • 4. International Journal of Network Security Its Applications (IJNSA), Vol.5, No.6, November 2013 68 Figure 2 . Demonstration of the change in the ISI at the end of the received symbol and at the received CP . and the equalized data y is obtained from r by ) ( ) ( ) ( 0 ∑ = − + ⋅ = + w L j j i Mk r j i Mk y w (4) The channel has 1 + h L taps, the TEQ has 1 + w L taps and the effective channel w h c ∗ = has 1 + c L taps, where w h c L L L + = . 3. Description algorithm of MERRY Consider the example in Figure 2. The broadcasted samples 2 and 10 are the same. But, at the receiver, the interfering samples earlier than sample 2 are not the whole identical to their correspondences before sample 10. If ( ), 2 h ( ) 3 h and ( ) 4 h were zero, then ( ) ( ) 10 2 r r = . If we try to force ( ) ( ) 10 2 r r = , we may force ( ) 2 h = ( ) 3 h = ( ) 4 h = 0, forcing the channel selected the same like the CP. The location of the window of v non-zero taps can be varied by comparing ( ) 3 r to ( ) 11 r , or ( ) 4 r to ( ) 12 r , etc. In general, if the channel length v Lh ≤ +1 , in that case the previous sample inside the CP must look like the previous sample inside the symbol. Unit cost function that reproduce: ( ) ( ) [ ] { } 1 , , 0 , 2 − ∈ ∆ ∆ + + + − ∆ + + = ∆ M N v Mk y v Mk y E J L (5) where ∆ is the sign synchronization parameter, which correspond to the preferred delay of the channel-TEQ collection. The choice of ∆ affects the cost function. A randomization gradient descent of Eq.(5) guides to a sightless, adaptive TEQ, because the broadcasted data not require be identified. The proposed MERRY algorithm performs a randomization gradient descent of Eq.(5), with a limitation to keep away from the slight solution w = 0. The MERRY algorithm is summarized as follows: For symbol , , 2 , 1 , 0 L = k
  • 5. International Journal of Network Security Its Applications (IJNSA), Vol.5, No.6, November 2013 69 ( ) ( ) ( ) ∆ + + + − ∆ + + = N v Mk r v Mk r k r ~ (6) ( ) ( ) ( ) k r k w k e T ~ = (7) ( ) ( ) ( ) ( ) k r k e k w k w ∗ − = + ~ 1 ~ µ (8) ( ) ( ) ( ) 1 ~ 1 ~ 1 + + = + k w k w k w (9) where ( ) ( ) ( ) [ ]T w L i r i r i r i r ) ( , , 1 , − − = L , and ∗ denotes complex conjugation. Due to the fact that MERRY compares with CP at the last part of the symbol, one update is achievable for each symbol. Interchanging applications of the limitation have set up one tap to unity, retaining a channel approximation and renormalizing to enforce 1 c = instead of 1 w = , or with a retribution term in the cost function to put into effect the norm limitation. 4. DST Implementation Applying the above algorithm to the DST approach solves the complexity problem and achieves higher bit rates than the DFT system. For the proposed DST-DMT system, the channel input sequence { DST n x , } at the output of the IDST block can be presented as [17] ( ) 1 , , 1 , 0 , 1 2 2 sin 2 1 0 2 1 , − =       + ⋅ ⋅ ⋅       = ∑ − = N n n N b X A N x b N b b DST n L π (10) where      = = otherwise b for Ab 1 0 2 1 (11) , and b X is the encoded bit stream. ) ( ) ( ) ( ) ( 0 i Mk n l i Mk x l i Mk r h L l DST DST + + − + ⋅ = + ∑ = h ) ( ) ( ) ( 0 ∑ = − + ⋅ = + w L j DST DST j i Mk r j i Mk y w
  • 6. International Journal of Network Security Its Applications (IJNSA), Vol.5, No.6, November 2013 70 Figure 3 DST system model. It is known that the DST has excellent spectral compaction and energy concentration properties (See Fig.(3)). It uses only real arithmetics as opposed to the complex-valued DFT. This reduces the signal processing complexity especially for real pulse-amplitude modulation signaling, where DFT-based processing still uses complex arithmetics and suffers from in-phase/quadrature imbalance problems which can cause appreciable performance degradation [11-18]. The cost function in Eq. (5) can be rewritten as: ( ) ( ) [ ] { } 1 , , 0 , 2 , − ∈ ∆ ∆ + + + − ∆ + + = ∆ M N v Mk y v Mk y E J DST DST DST L (12) The MERRY algorithm can be rewritten as: For symbol , , 2 , 1 , 0 L = k ( ) ( ) ( ) ∆ + + + − ∆ + + = N v Mk r v Mk r k r DST DST DST ~ (13) ( ) ( ) ( ) k r k w k e DST T DST DST ~ = (14) ( ) ( ) ( ) ( ) k r k e k w k w DST DST DST DST ∗ − = + ~ 1 ~ µ (15) ( ) ( ) ( ) 1 ~ 1 ~ 1 + + = + k w k w k w DST DST DST (16) where ( ) ( ) ( ) [ ]T w DST DST DST DST L i r i r i r i r ) ( , , 1 , − − = L , and ∗ denotes complex conjugation. 5. Simulation parameters We use the standard carrier-serving-area (CSA) loop1 [15] as our test channel. The channel impulse response consists of 512 samples sampled at a rate of 2.208 MHz. Also employ high pass filter at cutoff frequency of 5.4 kHz and pass band ripple of 0.5 dB to the standard loop1 to add the outcome of the splitter by the side of the transmitter. The DC channel (channel 0), channels 1- 5, and the Nyquist channel are not used. The DSL presentation metric is the possible bit rate for a fixed probability of error, IDST DST DST DST
  • 7. International Journal of Network Security Its Applications (IJNSA), Vol.5, No.6, November 2013 71 ∑       Γ + = i i SNR B 1 ln (17) When dB SNRi 40 = in frequency bin i , and Γ is the SNR gap ( Γ =9.8 + 6 - 4.2 = 11.6 dB). This corresponds to a system margin of 6 dB and a coding gain of 4.2 dB. Both the FFT size and the DST size are set to 512 = N . We assume that the power allocation is constant over all used sub-channels and that it is not changed after the TEQ is placed into the system. 6. Simulation Results A- for DFT Approach Figure 4 shows simulation results using CSA loop1. The CP size is 32. The FFT length is 512. We have 16 taps for the TEQ. Figure 5 demonstrates a plan for bit rate opposed versus SNR. The Bit rate for this plot was computed by running for 5000 symbols and gradually decreasing the step size over time. For all these SNR values, MERRY approaches the max SSNR solution. Figure 4. Achievable bit rate vs. time for the DFT system.
  • 8. International Journal of Network Security Its Applications (IJNSA), Vol.5, No.6, November 2013 72 Figure 5 Achievable bit rate vs. SNR for the DFT system. B- DST System Results As compared to figure 4 for the DFT approach, figure 6 shows the achievable bit rate vs. time for the DST approach at the same simulation parameters. As we can see in the case of DST approach, the performance is better (high bit rate and low complexity) than that of the DFT approach. Also, when comparing figure 5 for the DFT approach with figure 7 for the DST approach, we can see that the DST approach provides a higher bit rate than the DFT approach at the same SNR values.
  • 9. International Journal of Network Security Its Applications (IJNSA), Vol.5, No.6, November 2013 73 Figure 6 Achievable bit rate vs. time for the DST system. Figure 7 Achievable bit rate vs. SNR for the DST system.
  • 10. International Journal of Network Security Its Applications (IJNSA), Vol.5, No.6, November 2013 74 8. Conclusions The proposed IDST/DST has been used for modulation /demodulation stages in DMT systems. Our simulation results show that the DST-DMT system provides a better performance than the DFT-DMT system because of the excellent spectral compaction and energy concentration properties of the DST compared to the DFT. It was concluded that the proposed DST-DMT system achieves higher bit rates as compared with the conventional DFT-DMT system. References [1] I. Lee, J. S. Chow, and J. M. Cioffi, Performance evaluation of a fast computation algorithm for the DMT in high-speed subscriber loop, IEEE J. on Selected Areas in Comm., vol. 13, pp. 1564-1570, Dec. 1995. [2] K. Vanble, M. Moonen, and G. Leus, “Linear and Decision-Feedback Per Tone Equalization for DMT-Based Transmission Over IIR Channels,” I IEEE Transactions Signal Processing, vol. 54, no. 1, Jan. 2006. [3] G. Arslan, B. Lu, L. D. Clark, and B. L. Evans, Iterative Refinement Methods for Time-Domain Equalizer Design, EURASIP Journal on Applied Signal Processing vol. 2006, pp.1–12, Aug. 2005. [4] G. Arslan, B. L. Evans, and S. Kiaei, “Equalization for Discrete Multitone Transceivers to Maximize Bit Rate,” IEEE Transactions Signal Processing, vol. 49, no. 12, pp. 3123–3135, 2001. [5] J. S. Chow and J. M. Cioffi, A cost-effective maximum likelihood receiver for June multicarrier systems, in Proc. IEEE Int. Conf. Comm., vol. 2, (Chicago, IL), pp. 948- 952,1992. [6] J. S. Chow, J. M. Cioffi, and J. A. Bingham, Equalizer training algorithms for multicarrier modulation systems, in Proc. IEEE Int. Conf. Comm., vol. 2, (Geneva, Switzerland), pp. 761-765, May 1993. [7] N. Al-Dhahir and J. M. Cioffi, Efficiently computed reduced-parameter input-aided MMSE equalizers for ML detection: A unified approach, IEEE Trans. on Info. Theory,vol. 42, pp. 903-915, May 1996 [8] K. Van Acker, G. Leus, M. Moonen, O. van de Wiel, and T. Pollet, “Per Tone no.1, pp. Equalization for DMT-based Systems,” IEEE Transactions on Communications, vol. 49,109–119, 2001. [9] M. Ding, Z. Shen, and B. L. Evans, “An Achievable Performance Upper Bound for Discrete Multi Tone Equalization,” in Proceedings of IEEE Global Telecommunications Conference (GLOBECOM ’04), vol. 4, pp. 2297–2301, Dallas, Tex, USA, November–December 2004. [10] R. K. Martin, K. Vanbleu, M. Ding, et al., “Unification and Evaluation of Equalization Structures and Design Algorithms for Discrete Multi-tone Modulation Systems,” IEEE Transactions Signal Processing, vol. 53, no. 10, part 1, pp. 3880–3894, 2005. [11] A. Rushdi and J. Tuqan, PAPR Reduction in Trigonometric-Based OFDM Systems, IEEE Signals, Systems and Computers, Conference Record of the Forty-First Asiloma Conference pp.1747–1751, Nov. 2007. [12] P. Tan, and N. C. Beaulieu, A Comparison of DCT-Based OFDM and DFT-Based OFDM in Frequency Offset and Fading Channels, IEEE Transactions on Communications, vol. 54, no. 11, pp. 2113–2125, Nov. 2006. [13] P. Tan, and N. C. Beaulieu, An Improved DCT-Based OFDM Data Transmission Scheme, Personal, Indoor and Mobile Radio Communications, IEEE 16th International Symposium, pp.745–749, Sept. 2005. [14] E. Khan, and C. Heneghan, Iterative Refinement Methods for Time-Domain Equalizer Design, International Journal of Signal Processing, pp.126–130, 2006. [15] R. K. Martin, J. Balakrishnan, W. A. Sethares, and C. R. Johnson, Jr., “A Blind, Adaptive TEQ for Multicarrier Systems, IEEE Signal Processing Letters, vol. 9, no. 11, pp. 341{343, Nov. 2002. [16] A.-Y. Wu T.-S. Chan, Cost-efficient Parallel Lattice VLSI Architecture for the IFFT/FFT in DMT Transceiver Technology, IEEE, pp. 3517-3520, 1998. [17] A. B. Watson, Image Compression Using the Discrete Cosine Transform, Mathematica Journal, 4(1), 1994, p. 81-88. [18] P. Tan, N. C. Beaulieu, “A Comparison of DCT-Based OFDM and DFT-Based OFDM in frequency offset and fading channels,” IEEE Trans. On Commun., vol. 54, no. 11, Nov.2006.