This document discusses generating a QPSK signal using MATLAB. It begins with an introduction to PSK modulation techniques and QPSK. It then describes the simulation design process in MATLAB, including representing the QPSK signal using I and Q components, and generating the signal using formulas programmed in MATLAB code. The code generates a QPSK modulated signal from binary input data along with plots of the original data and modulated signal. It also describes representing the generated QPSK signal using scatter plots in MATLAB to visualize the constellation.
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...IOSR Journals
Abstract: Nowadays , Wireless Sensor Networks (WSNs) succed in domain of technology trends; new
require’sare continuously have more complex challenging, such as the real time location. The MAC layer
plays a crucial role in these networks; it controls the communication module and manages the medium sharing.
In this work, we integrate the received signal strength path-loss exponent estimation (RSS PLE) based on
location technique in Real Time Hybrid MAC (RTHMAC) protocol in goal to minimize the delay phase’s and
get more life time node’s. It combinesalso the advantages of both TDMA and FDMA in order to give a soft real
time communication for WSN.
Keywords: Duty cycle, RSS, PLE ,FDMA,TDMA, WSN ,Cluster
Multistage interconnection networks (MIN) are among the most efficient switching architectures for the number of switching Element (SE). Optical crosstalk in optical multistage interconnection network on the omega network topology Switches are arranged in multiple stages. These switches also referred to as switching element (SEs) have two input and two output ports, interconnected to the neighboring stages in a shuffle exchange connected pattern message routing in such a network is determined by the interstate connection pattern.
Optical Multistage interconnection networks (OMIN) are advanced version of MINs. The main Problem with OMIN is crosstalk. The main purpose of this paper is to Present crosstalk free modified omega network, which is based on time domain approach. This paper presents the source and destination based Algorithm (SDBA) .SDBA does the scheduling for source and their respective destination addresses for the message routing. SDBA is compared with the crosstalk modified omega network (CFMON).CFMON also Minimizes the crosstalk. This paper is the modified form of the omega network.
Partially connected 3D NoC - Access Noxim. Abhishek Madav
Project for building a partially connected 3D NoC using Access Noxim co-simulator as a part of the EECS 213 - Advanced Computer Architecture course at University of California, Irvine.
A NOVEL CHAOS BASED MODULATION SCHEME (CS-QCSK) WITH IMPROVED BER PERFORMANCEcscpconf
In recent years, various chaos based modulation schemes were evolved, of which the CS-DCSK
modulation technique provides better BER performance and bandwidth efficiency, due to its
code domain approach. The QCSK modulation technique provides double benefit: higher data
rate with similar BER performance and same bandwidth occupation as DCSK. By combining
the advantage of code shifted differential chaos shift keying (CS-DCSK) and Quadrature chaos
shift keying (QCSK) scheme, a novel CS-QCSK modulation scheme called code shifted
Quadrature chaos shift keying is proposed. The noise performance of CS-QCSK is better to
most conventional modulation schemes and also provides an increased data transmission rates
with greatly improved robustness. Analytical expressions for the bit-error rates are derived for
both AWGN channel and Rayleigh multipath fading channel. The simulation result shows that
the proposed method outperforms classical chaotic modulation schemes in terms of bit error rate (BER).
Designing Conservative Reversible N-Bit Binary Comparator for Emerging Quantu...VIT-AP University
The quantum-dot cellular automata (QCA) has more advantages than CMOS regarding area and power. This
work targets a conservative reversible comparator and its realization in QCA. In this work, we construct a
conservative reversible comparator with an optimal value of reversible metrics. In state to design, three conservative
reversible gates, namely PPC, PPNG-1 and PPNG-2 (PP = parity-preserving, C = comparator, N = new,
G = gate), are proposed. Furthermore, the quantum equivalent of 1-bit and 2-bit comparator is presented. The
proposed concept has been implemented through an algorithm for the n-bit comparator. Also, PPC workability
is tested in QCA. The PPC has been performing 1-bit comparator result with minimum area, cell complexity,
and latency, which is found to be 0.52 m2, 387 and 1 respectively. In addition, the complete energy dissipation
analysis to explore such as a thermal layout map of PPC is also presented in this paper. Further, average
energy dissipation v’s kink energy, maximum energy dissipation v’s kink energy, minimum energy dissipation
v’s kink energy and average output node polarization v’s temperature are provided in this paper. The proposed
comparator forwards an improved ratio of 33.33% in gate count and ranging from 27.27% to 29.35% in garbage
outputs than its counterparts circuits, which ensure more scalable.
RTH-RSS Mac: Path loss exponent estimation with received signal strength loca...IOSR Journals
Abstract: Nowadays , Wireless Sensor Networks (WSNs) succed in domain of technology trends; new
require’sare continuously have more complex challenging, such as the real time location. The MAC layer
plays a crucial role in these networks; it controls the communication module and manages the medium sharing.
In this work, we integrate the received signal strength path-loss exponent estimation (RSS PLE) based on
location technique in Real Time Hybrid MAC (RTHMAC) protocol in goal to minimize the delay phase’s and
get more life time node’s. It combinesalso the advantages of both TDMA and FDMA in order to give a soft real
time communication for WSN.
Keywords: Duty cycle, RSS, PLE ,FDMA,TDMA, WSN ,Cluster
Multistage interconnection networks (MIN) are among the most efficient switching architectures for the number of switching Element (SE). Optical crosstalk in optical multistage interconnection network on the omega network topology Switches are arranged in multiple stages. These switches also referred to as switching element (SEs) have two input and two output ports, interconnected to the neighboring stages in a shuffle exchange connected pattern message routing in such a network is determined by the interstate connection pattern.
Optical Multistage interconnection networks (OMIN) are advanced version of MINs. The main Problem with OMIN is crosstalk. The main purpose of this paper is to Present crosstalk free modified omega network, which is based on time domain approach. This paper presents the source and destination based Algorithm (SDBA) .SDBA does the scheduling for source and their respective destination addresses for the message routing. SDBA is compared with the crosstalk modified omega network (CFMON).CFMON also Minimizes the crosstalk. This paper is the modified form of the omega network.
Partially connected 3D NoC - Access Noxim. Abhishek Madav
Project for building a partially connected 3D NoC using Access Noxim co-simulator as a part of the EECS 213 - Advanced Computer Architecture course at University of California, Irvine.
A NOVEL CHAOS BASED MODULATION SCHEME (CS-QCSK) WITH IMPROVED BER PERFORMANCEcscpconf
In recent years, various chaos based modulation schemes were evolved, of which the CS-DCSK
modulation technique provides better BER performance and bandwidth efficiency, due to its
code domain approach. The QCSK modulation technique provides double benefit: higher data
rate with similar BER performance and same bandwidth occupation as DCSK. By combining
the advantage of code shifted differential chaos shift keying (CS-DCSK) and Quadrature chaos
shift keying (QCSK) scheme, a novel CS-QCSK modulation scheme called code shifted
Quadrature chaos shift keying is proposed. The noise performance of CS-QCSK is better to
most conventional modulation schemes and also provides an increased data transmission rates
with greatly improved robustness. Analytical expressions for the bit-error rates are derived for
both AWGN channel and Rayleigh multipath fading channel. The simulation result shows that
the proposed method outperforms classical chaotic modulation schemes in terms of bit error rate (BER).
Designing Conservative Reversible N-Bit Binary Comparator for Emerging Quantu...VIT-AP University
The quantum-dot cellular automata (QCA) has more advantages than CMOS regarding area and power. This
work targets a conservative reversible comparator and its realization in QCA. In this work, we construct a
conservative reversible comparator with an optimal value of reversible metrics. In state to design, three conservative
reversible gates, namely PPC, PPNG-1 and PPNG-2 (PP = parity-preserving, C = comparator, N = new,
G = gate), are proposed. Furthermore, the quantum equivalent of 1-bit and 2-bit comparator is presented. The
proposed concept has been implemented through an algorithm for the n-bit comparator. Also, PPC workability
is tested in QCA. The PPC has been performing 1-bit comparator result with minimum area, cell complexity,
and latency, which is found to be 0.52 m2, 387 and 1 respectively. In addition, the complete energy dissipation
analysis to explore such as a thermal layout map of PPC is also presented in this paper. Further, average
energy dissipation v’s kink energy, maximum energy dissipation v’s kink energy, minimum energy dissipation
v’s kink energy and average output node polarization v’s temperature are provided in this paper. The proposed
comparator forwards an improved ratio of 33.33% in gate count and ranging from 27.27% to 29.35% in garbage
outputs than its counterparts circuits, which ensure more scalable.
MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM ijwmn
In recent years, chaotic communication is a hot research topic and it suits better for the emerging wireless networks because of its excellent features. Different chaos based modulation schemes have evolved, of which the CS-DCSK modulation technique provides better BER performance and bandwidth
efficiency, due to its code domain approach. The QCSK modulation technique provides double benefit: higher data rate with similar BER performance and same bandwidth occupation as DCSK. By combining the advantage of code shifted differential chaos shift keying (CS-DCSK) and Quadrature chaos shift keying (QCSK) scheme, a novel modulation scheme called code shifted Quadrature chaos shift keying (CS-QCSK) is proposed and its suitability in a multiuser scenario is tested in this paper. The analytical expressions for the bit-error rate for Multi-user CS-QCSK scheme (MU-CS-QCSK) under Rayleigh
multipath fading channel is derived. The simulation result shows that, in multiuser scenario the proposed method outperforms classical chaotic modulation schemes in terms of bit error rate (BER).
WARM WELCOME FROM HCL VELACHERY…….
HCL Learning is part of HCL Info Systems Ltd, India’s Premier information enabling company with an annual turnover of 15000 crores Leveraging on the 34 years of industry experience of HCL, with an objective to develop quality IT professionals to meet this ever expanding requirement of Hardware Networking and Software professionals for the IT sector, HCL has launched HCL Career Development Centre.
For any clarification,
contact Person
Mr.Senthilvel.S
9382207007
HCL Velachery -42
RADIAL BASIS FUNCTION PROCESS NEURAL NETWORK TRAINING BASED ON GENERALIZED FR...cseij
For learning problem of Radial Basis Function Process Neural Network (RBF-PNN), an optimization
training method based on GA combined with SA is proposed in this paper. Through building generalized
Fréchet distance to measure similarity between time-varying function samples, the learning problem of
radial basis centre functions and connection weights is converted into the training on corresponding
discrete sequence coefficients. Network training objective function is constructed according to the least
square error criterion, and global optimization solving of network parameters is implemented in feasible
solution space by use of global optimization feature of GA and probabilistic jumping property of SA . The
experiment results illustrate that the training algorithm improves the network training efficiency and
stability.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
PERFORMANCE IMPROVEMENT OF NONREGENERATIVE COOPERATIVE RELAY NETWORKS WITH OP...ijwmn
This paper analyzes the performance of Channel Side Information (CSI)-assisted cooperative amplify-andforward
(CAF) relay networks that employ both the node placement (i.e., relay position) based optimal
power allocation policy among collaborating nodes and adaptive M-ary quadrature amplitude modulation
(M-QAM)/ M-ary phase shift keying (M-PSK) techniques in generalized wireless fading environments. In
particular, we advocate a simple yet unified numerical approach based on the marginal moment generating
function (MGF) of the total received Signal to Noise Ratio (SNR) to derive analytical expressions for the
average bit error rate (ABER), mean achievable spectral efficiency, and outage probability performance
metrics. The proposed analytical framework is sufficiently general and flexible to characterize the
performance of adaptive-link CAF relay networks over a wide range of fading distributions (i.e., not
restricted to Rayleigh fading or independent identically distributed (i.i.d) Nakagami-m fading ) with
independent but non-identically distributed (i.n.d) fading statistics across the spatially distributed diversity
paths. Additionally, we further simplify the computational complexity, by employing the use of an
“approximate MGF expression” to compute the system performance metrics over the generalized fading
channel. Employing the above novel approach based on “approximate MGF” in conjunction derived
analytical frameworks allows us to simplify the computation complexity of achievable spectral efficiency as
well as ABER of CAF relay system in the generalized fading environments by simply replacing appropriate
single channel MGF which is readily available
IMPLEMENTATION OF LOW POWER ADIABATIC SRAMVLSICS Design
In the featuring VLSI era, compact electronic devices are popular. The reliability and durability of such compact devices relies on low power utilization. The purpose of this project was to implement a low power adiabatic Static Random Access Memory (SRAM), with the following objectives - To reduce the power waste by means of stepwise charging using tank capacitors which is an adiabatic way of generating power
clock. This method is capable of recuperating the electrical energy back to the source. Further to examine the Static Noise Margin (SNM) – a parameter which gives detailed information about the cell stability – in contrast with conventional 6T, 7T and 8T topologies of SRAM under 180 nm technology. Finally, SNM
variations with respect to process parameters are also discussed. All the implementations and analysis were made using CADENCE tool and MATLAB tool.
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGYijwmn
In an era where communication has a most important role in modern societies, designing efficient
algorithms for data transmission is of the outmost importance. TDMA is a technology used in many
communication systems such as satellite, cell phone as well as other wireless or mobile networks. Most 2G
cellular systems as well as some 3G are TDMA based. In order to transmit data in such systems we need
to cluster them in packages. To achieve a faster transmission we are allowed to preempt the transmission of
any packet in order to resume at a later time. Preemption can be used to reduce idleness of some stations.
Such preemptions though come with a reconfiguration cost in order to setup for the next transmission. In
this paper we propose two algorithms which yield improved transmission scheduling. These two algorithms
we call MGA and IMGA (Improved MGA). We have proven an approximation ratio for MGA and ran
experiments to establish that it works even better in practice. In order to conclude that MGA will be a very
helpful tool in constructing an improved schedule for packet routing using preemtion with a setup cost, we
compare its results to two other efficient algorithms designed by researchers in the past: A-PBS(d+1) and
GWA. To establish the efficiency of IMGA we ran experiments in comparison to MGA as well as APBS(d+1)
and GWA. IMGA has proven to produce the most efficient schedule on all counts.
A 1.8 V 25 Mbps CMOS single-phase, phase-locked loop-based BPSK, QPSK demodul...IJECEIAES
A single-phase binary/quadrature phase-shift keying (BPSK/QPSK) demodulator basing on a phase-locked loop (PLL) is described. The demodulator relies on a linear characteristic a rising-edge RESET/SET flip-flop (RSFF) employed as a phase detector. The phase controller takes the average output from the RSFF and performs a sub-ranging/re-scaling operation to provide an input signal to a voltage-controlled oscillator (VCO). The demodulator is truly modular which theoretically can be extended for a multiple-PSK (m-PSK) signal. Symbol-error rate analysis has also been extensively carried out. The proposed BPSK and QPSK demodulators
have been fabricated in a 0.18 m digital complementary metal–oxide–semiconductor (CMOS) process where they operate from a single supply of 1.8 V. At a carrier frequency of 60 MHz, the BPSK and QPSK demodulators achieved maximum symbol rates of 25 and 12.5 Msymb/s while consuming 0.68 and 0.79 mW, respectively. At these maximum symbol rates, the BPSK and QPSK demodulators deliver symbol-error rates less than 7.9×10-10 and 9.8×10-10, respectively where their corresponding energy per bit figures were at 27.2 and 31.7 pJ.
Design and analysis of different digital communication systems and determinat...eSAT Journals
Abstract For a specialized device or set-up in case of any practical communication related problem definition, a sound communication system consisting of the necessary integral parts is very crucial. As such, the design and an analysis of the various communication system is very critical as it directly effects the performance of the device and also reveals the inherent capacity of the system to produce the desired results. In this respect our topic for this paper is the design and analysis of different digital communication systems with a view to determine the most effective system considering all the parameters so that it can be used for important communication based problems and situations. In the next section we will mainly focus on the design processes of various systems, the theory involved, the simulation results, some special techniques of error correction and also the error performance of the systems. Keywords- modulation, digital, communication systems, shift keying, error performance, SNR
MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM ijwmn
In recent years, chaotic communication is a hot research topic and it suits better for the emerging wireless networks because of its excellent features. Different chaos based modulation schemes have evolved, of which the CS-DCSK modulation technique provides better BER performance and bandwidth
efficiency, due to its code domain approach. The QCSK modulation technique provides double benefit: higher data rate with similar BER performance and same bandwidth occupation as DCSK. By combining the advantage of code shifted differential chaos shift keying (CS-DCSK) and Quadrature chaos shift keying (QCSK) scheme, a novel modulation scheme called code shifted Quadrature chaos shift keying (CS-QCSK) is proposed and its suitability in a multiuser scenario is tested in this paper. The analytical expressions for the bit-error rate for Multi-user CS-QCSK scheme (MU-CS-QCSK) under Rayleigh
multipath fading channel is derived. The simulation result shows that, in multiuser scenario the proposed method outperforms classical chaotic modulation schemes in terms of bit error rate (BER).
WARM WELCOME FROM HCL VELACHERY…….
HCL Learning is part of HCL Info Systems Ltd, India’s Premier information enabling company with an annual turnover of 15000 crores Leveraging on the 34 years of industry experience of HCL, with an objective to develop quality IT professionals to meet this ever expanding requirement of Hardware Networking and Software professionals for the IT sector, HCL has launched HCL Career Development Centre.
For any clarification,
contact Person
Mr.Senthilvel.S
9382207007
HCL Velachery -42
RADIAL BASIS FUNCTION PROCESS NEURAL NETWORK TRAINING BASED ON GENERALIZED FR...cseij
For learning problem of Radial Basis Function Process Neural Network (RBF-PNN), an optimization
training method based on GA combined with SA is proposed in this paper. Through building generalized
Fréchet distance to measure similarity between time-varying function samples, the learning problem of
radial basis centre functions and connection weights is converted into the training on corresponding
discrete sequence coefficients. Network training objective function is constructed according to the least
square error criterion, and global optimization solving of network parameters is implemented in feasible
solution space by use of global optimization feature of GA and probabilistic jumping property of SA . The
experiment results illustrate that the training algorithm improves the network training efficiency and
stability.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
PERFORMANCE IMPROVEMENT OF NONREGENERATIVE COOPERATIVE RELAY NETWORKS WITH OP...ijwmn
This paper analyzes the performance of Channel Side Information (CSI)-assisted cooperative amplify-andforward
(CAF) relay networks that employ both the node placement (i.e., relay position) based optimal
power allocation policy among collaborating nodes and adaptive M-ary quadrature amplitude modulation
(M-QAM)/ M-ary phase shift keying (M-PSK) techniques in generalized wireless fading environments. In
particular, we advocate a simple yet unified numerical approach based on the marginal moment generating
function (MGF) of the total received Signal to Noise Ratio (SNR) to derive analytical expressions for the
average bit error rate (ABER), mean achievable spectral efficiency, and outage probability performance
metrics. The proposed analytical framework is sufficiently general and flexible to characterize the
performance of adaptive-link CAF relay networks over a wide range of fading distributions (i.e., not
restricted to Rayleigh fading or independent identically distributed (i.i.d) Nakagami-m fading ) with
independent but non-identically distributed (i.n.d) fading statistics across the spatially distributed diversity
paths. Additionally, we further simplify the computational complexity, by employing the use of an
“approximate MGF expression” to compute the system performance metrics over the generalized fading
channel. Employing the above novel approach based on “approximate MGF” in conjunction derived
analytical frameworks allows us to simplify the computation complexity of achievable spectral efficiency as
well as ABER of CAF relay system in the generalized fading environments by simply replacing appropriate
single channel MGF which is readily available
IMPLEMENTATION OF LOW POWER ADIABATIC SRAMVLSICS Design
In the featuring VLSI era, compact electronic devices are popular. The reliability and durability of such compact devices relies on low power utilization. The purpose of this project was to implement a low power adiabatic Static Random Access Memory (SRAM), with the following objectives - To reduce the power waste by means of stepwise charging using tank capacitors which is an adiabatic way of generating power
clock. This method is capable of recuperating the electrical energy back to the source. Further to examine the Static Noise Margin (SNM) – a parameter which gives detailed information about the cell stability – in contrast with conventional 6T, 7T and 8T topologies of SRAM under 180 nm technology. Finally, SNM
variations with respect to process parameters are also discussed. All the implementations and analysis were made using CADENCE tool and MATLAB tool.
MESSAGE ROUTING IN WIRELESS AND MOBILE NETWORKS USING TDMA TECHNOLOGYijwmn
In an era where communication has a most important role in modern societies, designing efficient
algorithms for data transmission is of the outmost importance. TDMA is a technology used in many
communication systems such as satellite, cell phone as well as other wireless or mobile networks. Most 2G
cellular systems as well as some 3G are TDMA based. In order to transmit data in such systems we need
to cluster them in packages. To achieve a faster transmission we are allowed to preempt the transmission of
any packet in order to resume at a later time. Preemption can be used to reduce idleness of some stations.
Such preemptions though come with a reconfiguration cost in order to setup for the next transmission. In
this paper we propose two algorithms which yield improved transmission scheduling. These two algorithms
we call MGA and IMGA (Improved MGA). We have proven an approximation ratio for MGA and ran
experiments to establish that it works even better in practice. In order to conclude that MGA will be a very
helpful tool in constructing an improved schedule for packet routing using preemtion with a setup cost, we
compare its results to two other efficient algorithms designed by researchers in the past: A-PBS(d+1) and
GWA. To establish the efficiency of IMGA we ran experiments in comparison to MGA as well as APBS(d+1)
and GWA. IMGA has proven to produce the most efficient schedule on all counts.
A 1.8 V 25 Mbps CMOS single-phase, phase-locked loop-based BPSK, QPSK demodul...IJECEIAES
A single-phase binary/quadrature phase-shift keying (BPSK/QPSK) demodulator basing on a phase-locked loop (PLL) is described. The demodulator relies on a linear characteristic a rising-edge RESET/SET flip-flop (RSFF) employed as a phase detector. The phase controller takes the average output from the RSFF and performs a sub-ranging/re-scaling operation to provide an input signal to a voltage-controlled oscillator (VCO). The demodulator is truly modular which theoretically can be extended for a multiple-PSK (m-PSK) signal. Symbol-error rate analysis has also been extensively carried out. The proposed BPSK and QPSK demodulators
have been fabricated in a 0.18 m digital complementary metal–oxide–semiconductor (CMOS) process where they operate from a single supply of 1.8 V. At a carrier frequency of 60 MHz, the BPSK and QPSK demodulators achieved maximum symbol rates of 25 and 12.5 Msymb/s while consuming 0.68 and 0.79 mW, respectively. At these maximum symbol rates, the BPSK and QPSK demodulators deliver symbol-error rates less than 7.9×10-10 and 9.8×10-10, respectively where their corresponding energy per bit figures were at 27.2 and 31.7 pJ.
Design and analysis of different digital communication systems and determinat...eSAT Journals
Abstract For a specialized device or set-up in case of any practical communication related problem definition, a sound communication system consisting of the necessary integral parts is very crucial. As such, the design and an analysis of the various communication system is very critical as it directly effects the performance of the device and also reveals the inherent capacity of the system to produce the desired results. In this respect our topic for this paper is the design and analysis of different digital communication systems with a view to determine the most effective system considering all the parameters so that it can be used for important communication based problems and situations. In the next section we will mainly focus on the design processes of various systems, the theory involved, the simulation results, some special techniques of error correction and also the error performance of the systems. Keywords- modulation, digital, communication systems, shift keying, error performance, SNR
Design and analysis of different digital communication systems and determinat...eSAT Journals
Abstract For a specialized device or set-up in case of any practical communication related problem definition, a sound communication system consisting of the necessary integral parts is very crucial. As such, the design and an analysis of the various communication system is very critical as it directly effects the performance of the device and also reveals the inherent capacity of the system to produce the desired results. In this respect our topic for this paper is the design and analysis of different digital communication systems with a view to determine the most effective system considering all the parameters so that it can be used for important communication based problems and situations. In the next section we will mainly focus on the design processes of various systems, the theory involved, the simulation results, some special techniques of error correction and also the error performance of the systems. Keywords- modulation, digital, communication systems, shift keying, error performance, SNR
Design and analysis of different digital communication systems and determinat...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
A single-phase/single-loop multiple-phase-shift-keying (m-PSK) demodulator is described. The demodulator relies on a linear range of an exclusive-OR (XOR) gate employed as a phase detector. The phase controller takes the average output from the XOR gate and performs a sub-ranging/re-scaling operation to provide an input signal to a voltage-controlled oscillator (VCO). The demodulator is truly modular which theoretically can be extended
for an m-PSK signal. The proposed single-phase binary-/quadrature-PSK (BPSK/QPSK) demodulators have been implemented with low-cost discrete components. The core of the phase controller simply relies on number of stages of a full-wave rectifier and a linear amplifier built from well-known op-amp-based negative feedback circuits. The demodulator prototypes operate from a single supply of 5 V. At a carrier frequency of 100 kHz, both the BPSK and QPSK demodulators achieved the maximum symbol rate of 20 ksymbol/s respectively. At these symbol rates, the BPSK and QPSK demodulators deliver symbol-error rates less than 2×10-10 and 7×10-10.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
It contains the introduction, modulation, demodulation, phasor diagram, constellation diagram,time-domain diagram, signal space diagram, power spectral diagram, spectral diagram, bandwidth, spectral efficiency, uses, advantages, and disadvantages.
Comparative Study and Performance Analysis of different Modulation Techniques...Souvik Das
A comparative study and performance analysis of different modulation
techniques which shows graphically and comparative results Channel Noise
with Bit Error Rate of ASK, FSK, PSK and QPSK.
This slide describe the techniques of digital modulation and Bandwidth Efficiency:
The first null bandwidth of M-ary PSK signals decrease as M increases while Rb is held constant.
Therefore, as the value of M increases, the bandwidth efficiency also increases.
The Quadrature Phase Shift Keying QPSK is a variation of BPSK, and it is also a Double Side Band Suppressed Carrier DSBSC modulation scheme, which sends two bits of digital information at a time, called as bigits.
Instead of the conversion of digital bits into a series of digital stream, it converts them into bit pairs. This decreases the data bit rate to half, which allows space for the other users.
QPSK (Quadrature Phase Shift Keying) is type of phase shift keying. Unlike BPSK which is a DSBCS modulation scheme with digital information for the message, QPSK is also a DSBCS modulation scheme but it sends two bits of digital information a time (without the use of another carrier frequency).
The amount of radio frequency spectrum required to transmit QPSK reliably is half that required for BPSK signals, which in turn makes room for more users on the channel.
Efficient reconfigurable architecture of baseband demodulator in sdreSAT Journals
Abstract This paper presents the simulation architecture and performance analysis with the use of ZCD technic. A Zero-Crossing based All-Digital Baseband Demodulation architecture is proposed in this work. This architecture supports demodulation of all modulation schemes including MSK, PSK, FSK, and QAM. The proposed structure is very low area, low power, and low latency and can operate in real-time. Moreover it can switch, in run-time, between multiple modulation schemes like GMSK (GSM), QPSK (CDMA), GFSK (Bluetooth), 8-PSK (EDGE), Offset-QPSK (W-CDMA), etc. In addition, the phase resolution of the demodulator is scalable with performance. In addition, bit-wise amplitude quantization based quad-decomposition approach is utilized to demodulate higher order M-ary QAM modulations such as 16-QAM & 64-QAM, which is also a highly scalable architecture. This structure of demodulator provides energy-efficient and resource-efficient implementation of various wireless standards in physical layer of SDR. Keywords — Physical layer, Mobile and Wireless Communication, Software Defined radio (SDR), Zero Cross Detection (ZCD), Modulation Schemes, Architecture, high level synthesis, FPGA.
The paper discuses about the performance of digital modulation schemes – BPSK, QPSK and QAM using
MATLAB. The performance of these schemes is evaluated by finding the bit error rate (BER) on AWGN and
Rayleigh channels. Initially a MATLAB code is generated and the performance of these modulation schemes
BPSK,QPSK and QAM is evaluated by finding BER and signal to noise ratio over AWGN and Rayleigh fading
channels. Later a simulation model is created using Simulink for these modulation schemes and its performance is
evaluated on AWGN channel.
Similar to 2 - Generation of PSK signal using non linear devices via MATLAB (presented in a Malaysian conference) (20)
Abstract— The movie making is a multibillion-dollar industry. In 2018, the global movie business has generated nearly $41.5 billion in box office and more than that in merchandise revenues. But it is not a guaranteed business: every year we witness big buster and budget movies that become either a “hit” or a “flop”. The success of a movie is mainly judged by looking at ratio of its gross revenue over its budget, but some may also call a movie successful if it bagged critics praise and awards, both of which do not necessarily convert to financial revenue. In our project we look from an investor point of view, who largely favour financial return over any other attribute. But to predict the success of a movie, an investor can’t only rely on superficial attributes, a typical reason why Machine Learning (ML) prediction will prove to be very useful. We are going to implement this prediction using two ML methods that we have studied during the subject CMPE542, namely Random Forest and Neural Network. These are very adapted for discriminating classes, and can thus help us very effectively in pointing to successful or failed movies after being trained on a set of 5043 movies which data have been scraped from IMDB. At the end of the project, we should be able to know which method has the highest accuracy, what movies sell the best at the box office and most importantly for movies producers, what movie features are the most decisive in making a movie profitable.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Cosmetic shop management system project report.pdfKamal Acharya
Buying new cosmetic products is difficult. It can even be scary for those who have sensitive skin and are prone to skin trouble. The information needed to alleviate this problem is on the back of each product, but it's thought to interpret those ingredient lists unless you have a background in chemistry.
Instead of buying and hoping for the best, we can use data science to help us predict which products may be good fits for us. It includes various function programs to do the above mentioned tasks.
Data file handling has been effectively used in the program.
The automated cosmetic shop management system should deal with the automation of general workflow and administration process of the shop. The main processes of the system focus on customer's request where the system is able to search the most appropriate products and deliver it to the customers. It should help the employees to quickly identify the list of cosmetic product that have reached the minimum quantity and also keep a track of expired date for each cosmetic product. It should help the employees to find the rack number in which the product is placed.It is also Faster and more efficient way.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
6th International Conference on Machine Learning & Applications (CMLA 2024)ClaraZara1
6th International Conference on Machine Learning & Applications (CMLA 2024) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of on Machine Learning & Applications.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Overview of the fundamental roles in Hydropower generation and the components involved in wider Electrical Engineering.
This paper presents the design and construction of hydroelectric dams from the hydrologist’s survey of the valley before construction, all aspects and involved disciplines, fluid dynamics, structural engineering, generation and mains frequency regulation to the very transmission of power through the network in the United Kingdom.
Author: Robbie Edward Sayers
Collaborators and co editors: Charlie Sims and Connor Healey.
(C) 2024 Robbie E. Sayers
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
3. - By viewing the phase itself as conveying the
information, in which case the demodulator must
have a reference signal to compare the received
signal's phase against; or
- By viewing the change in the phase as conveying
information — differential schemes, some of which
do not need a reference carrier (to a certain extent).
The figure below illustrates these two concepts:
Fig. 1 BPSK signal against its binary data stream
A convenient way to represent PSK schemes is
on a constellation diagram. This shows the points in
the complex plane where, in this context, the real
and imaginary axes are termed the in-phase and
quadrature axes respectively due to their 90°
separation. Such a representation on perpendicular
axes lends itself to straightforward implementation.
The amplitude of each point along the in-phase axis
is used to modulate a cosine (or sine) wave and the
amplitude along the quadrature axis to modulate a
sine (or cosine) wave.
In PSK, the constellation points chosen are usually
positioned with uniform angular spacing around a
circle. This gives maximum phase-separation
between adjacent points and thus the best immunity
to corruption. They are positioned on a circle so
that they can all be transmitted with the same
energy. In this way, the moduli of the complex
numbers they represent will be the same and thus so
will the amplitudes needed for the cosine and sine
waves. Two common examples are "binary phase-
shift keying" (BPSK) which uses two phases (see
Fig. 2), and "quadrature phase-shift keying" (QPSK)
which uses four phases (see Fig. 3), although any
number of phases may be used. Since the data to be
conveyed are usually binary, the PSK scheme is
usually designed with the number of constellation
points being a power of 2.
Fig. 2 Constellation diagram for BPSK
Fig. 3 Constellation diagram for QPSK
As said in the Abstract, we are going to
investigate on the QPSK (Fig. 3) since it is of more
recurrent use in the markets, and due to its decently
large bandwidth of transmission compared to BPSK,
it is more likely to be chosen than BPSK. But it is
worth to say that BPSK (also sometimes called
PRK, Phase Reversal Keying, or 2PSK) is the
simplest form of phase shift keying (PSK). It uses
two phases which are separated by 180° and so can
also be termed 2-PSK. It does not particularly
matter exactly where the constellation points are
4. positioned, and in this figure they are shown on the
real axis, at 0° and 180°. This modulation is the
most robust of all the PSKs since it takes the
highest level of noise or distortion to make the
demodulator reach an incorrect decision. It is,
however, only able to modulate at 1 bit/symbol (as
seen in Fig. 1) and so is unsuitable for high data-
rate applications.
The general form for BPSK follows the equation:
This yields two phases, 0 and π. In the specific form,
binary data is often conveyed with the following
signals:
for binary ‘0’ and:
for binary ‘1’, but this is of course arbitrary, and it
depend on the convention on the receiver side.
III. SIMULATION DESIGN
Emulating the QPSK is a matter of programming.
So after some researches on the MATLAB syntax
rules, and thanks to the canonical formulas that
rules the PSK modulation (see Analysis and
Discussion part), we have came out with a method
of PSK signal simulation which is algorithm based,
and programmed through MALTAB code.
We are going to elaborate on the Algorithm-based
technique which is considered as a non-linear
method, since the variable entered must pass
through some MATLAB mathematical shells such
as square-root, and cosinus as shown in the
upcoming formulas of PSK.
A. Algorithm-based Generation of PSK in MATLAB
Similarly to the BSK equation, the following
formula si(t) is the governing law for locating the
PSK phase in the constellation:
It is having four possible states (n=1..4), each one
represent a two bits data combination.
This yields to four phases π/4, 3π/4, 5π/4 and 7π/4
as needed.
That si(t) formula can be rearranged, to give way to
two vector components I & Q, as follows:
I(t)
Q(t)
I(t) and Q(t) are offset by 90°, and their negative
summation will lead directly to the general QPSK
Reduced Form RF, as depicted in Fig. 4.
Fig. 4 Block Diagram of an I/Q Modulator in QPSK
The first function I(t) is used as the in-phase
component of the signal and the second Q(t) as the
quadrature component of the signal (see Fig. 5)
Fig. 5 I and Q Represented in Polar Form
So our task consists in converting these formulas
into MATLAB codified form, and to follow the
modulation steps prescribed as in Fig. 4 & 5, and
that is the backbone of our simulation in next parts.
5. After due transformations and program flow
charting, we have reached a program that is
producing the desired QPSK output:
% Data sequence to be sent through PSK
d = [0 1 0 0 1 1 0 0 1 1]
% Convert unipolar to bipolar
b = 2*d-1
% Bit duration
Tb = 1
% Carrier frequency
fc = 3/Tb
% This will result in unit amplitude waveforms
Es = Tb/2
% Discrete time samples between 0 and
10*Tb(1000 samples)
t = linspace(0, 10, 1000);
% Number of samples
N = length(t)
% Number of samples per bit
Nsb = N/length(d)
% Replicate each bit Nsb times
dd = repmat(d', 1, Nsb);
bb = repmat(b', 1, Nsb);
% Represent dw into a column vector(column by
column)
dw = dd';
% Represent dw into a row vector(row by row)
dw = dw(:)';
% Represent bw into a column vector(column by
column)
bw = bb';
% Data sequence samples
bw = bw(:)';
o = b(1:2:end) %separating odd bits
e = b(2:2:end) %separating even bits
oo = repmat(o', 1, Nsb)
ee = repmat(e', 1, Nsb)
ow = oo'
ow = ow(:)'
ew = ee'
ew = ew(:)'
tc = linspace(0, 10, 500);
% Inserting the PSK formulas
IPhaseOsc = 1/sqrt(2*Es/Tb)*cos(2*pi*fc*tc)
QPhaseOsc = 1/sqrt(2*Es/Tb)*sin(2*pi*fc*tc)
qpskModulated = ow.*IPhaseOsc + ew.*QPhaseOsc
% Plotting the waveforms
subplot(4,1,1);
plot(t,dw);axis([0 10 -1.5 1.5])
subplot(4,1,2);
plot(t,bw);axis([0 10 -1.5 1.5])
subplot(4,1,3);
plot(tc,qpskModulated);axis([0 10 -1.5 1.5])
And as an output of this program, we get our PSK
modulated signal waveform, along with the original
binary data transmitted:
Fig. 6 MATLAB generated QPSK Signal
What we just did
in the program,
is to take
advantage of the
fact that QPSK
can be viewed as
two independent
BPSK signals.
And so we
created two
channels
IPhaseOsc and
QPhaseOsc that
were processed
independently by
MATALB and
then conjoined
later, to produce
the final QPSK
signal. The
following Fig. 7
is representing
how it was done
in MATLAB.
Fig. 7 Block
Diagram tracing the
Path of Data Flow
in our MATLAB
Code
6. B. Simulate QPSK Signal Using Scatter Plots
In this part, we will observe the generated signal
for our QPSK modulated system. The output
symbols are pulse shaped, using a raised cosine
filter.
To create a QPSK modulator object. We typed the
following at the MATLAB command line:
hMod = modem.pskmod('M', 4, 'PhaseOffset',
pi/4);
We created an upsampling filter, with an upsample
rate of 16:
Rup = 16; % up sampling rate
hFilDesign = fdesign.pulseshaping(Rup,'Raised
Cosine','Nsym,Beta',Rup,0.50);
hFil = design(hFilDesign);
We created the transmit signal:
d = randi([0 hMod.M-1], 100, 1); % Generate
data symbols
sym = modulate(hMod, d); % Generate
modulated symbols
xmt = filter(hFil, upsample(sym, Rup));
We created a scatter plot and we set the samples per
symbol to the upsampling rate of the signal:
hScope = commscope.ScatterPlot
hScope.SamplesPerSymbol = Rup;
In this simulation, the absolute sampling rate or
symbol rate is not specified. Se we use the default
value for SamplingFrequency, which is 8000. This
results in 2000 symbols per second symbol rate.
We set the constellation value of the scatter plot to
the expected constellation, by typing in MATLAB:
hScope.Constellation = hMod.Constellation;
Since the pulse shaping filter introduces a delay, we
discarded these transient values by setting
MeasurementDelay to the group delay of the filter,
which is four symbol durations or 4/Rs seconds:
groupDelay = (hFilDesign.NumberOfSymbols/2);
hScope.MeasurementDelay = groupDelay
/hScope.SymbolRate;
We updated the scatter plot with transmitted signal:
update(hScope, xmt)
We have then displayed the ideal constellation and
evaluated how closely it matched the transmitted
signal. To display the ideal constellation:
hScope.PlotSettings.Constellation = 'on';
One way to create a better match between the two
signals is to normalize the filter. We normalized the
filter by typing the following in MATLAB:
hFil.Numerator = hFil.Numerator /
max(hFil.Numerator);
We refilter the signal using a normalized filter.
xmt = filter(hFil, upsample(sym, Rup));
We reset the scope before displaying the
transmitted signal. Resetting the scope also resets
the counter for measurement delay, discarding the
transient filter values. To reset the scope, we typed
the following at the MATLAB command line:
reset(hScope)
And finally we updated for the second time the
scatter plot so it displays the QPSK signal.
update(hScope, xmt)
Fig. 8 The match between the ideal constellation points and
the transmitted signal is nearly identical
7. To view the transmitted signal more clearly, we
turned off the ideal constellation by clicking on its
ratio button in the Fig. 8 window, and we selected
Signal Trajectory to display all the possible
trajectories and movement of the phase shifts when
the signal is being modulated in real-time:
Fig. 9 Scatter Plot of our final QPSK signal generated
IV.ANALYSIS AND DISCUSSION
For proceeding to the analysis of our generated
signal, we opted for two useful techniques used by
professional of telecommunication domain, namely:
- The function h = modem.pskmod(M) which
constructs a PSK modulator object h for M-ary
modulation. And analyse it inside a transmission
system, and
- The graphical block QPSK Modulator
Baseband in Simulink GUI, which comes with a set
of virtual spectral analysers and scatter plot
displayers, as it would be in a real life laboratory.
These two techniques are inherent MATLAB
functions, used to produce PSK signals, without the
need of an Algorithm-based program, like the one
we developed in the part III-A. We only need to plug
these functions in the correct space in MATLAB or
Simulink, in order to get the full analysis of the
QPSK generation system.
A. Analyse the noise generated with the transmitted
PSK signal using the function modem.pskmod(M)
Coming back to our last signal generated, we
have the possibility to emulate the Additive White
Gaussian Noise (AWGN), by the mean of a simple
command y = awgn(xmt,snr), this command
add white Gaussian noise to our QPSK signal by
passing xmt that we created previously through an
AWGN channel. We therefore type the following at
the MATLAB command line in part III-B.:
rcv = awgn(xmt, 20, 'measured'); % Add AWGN
MATLAB will return the following plot:
Fig. 10 Scatter Plot of QPSK signal with GWN added to it
8. This last plot, is illustrating the effect of
interference and noise when hitting a QPSK signal.
The noise will not only affect the amplitude of the
QPSK signal (represented in blue points, mapped in
the four coins), but it will also have an adverse
impact on the trajectory of the phase changes,
which changed from straight lines to crooked and
broken lines.
We do not have any concern if the QPSK signal
amplitude is altered, because the information is not
residing there, but the problem is the distortions that
are corrupting the trajectories, and this may
compromise the conveying of the data.
But to have the certitude that the noise will have no
harmful fallouts, we conducted a full transmission
simulation in order to get the signal QPSK on the
reception side, and to compare it with the original
signal QPSK in the transmission side, to see if there
was any change of data values due to the noise.
After this full transmission simulation, we have
obtained these MATLAB results plotted in Fig. 11:
Fig. 11 Transmission and Reception of QPSK signal with
GWN added to it, and no change of data is observed
As demonstrated in the six plots above, the input
Binary Data is perfectly matching with the detected
Binary Data after QPSK demodulation is done, and
the noise have absolutely no threat to the veracity of
the data transmission as they have been preserved
intact through the transmission channel.
That is an experiment that shows the reliability of
QPSK and how conservative it is for the signal
transmitted, despite presence of noise or
interferences that mix up with the original signal.
B. The graphical block QPSK Modulator Baseband
in Simulink GUI used to analyse QPSK
Before we start in examining the signal from
Simulink platform, it is useful to remind about the
Bit Error Rate (BER) in relation with signal fidelity
at reception and how SNR can be taken into
account for getting the most faithful signal possible.
9. At this stage of our paper, it is now clear how
QPSK digital data is represented by 4 points around
a circle which correspond to 4 phases of the carrier
signal. These points are also called symbols. Fig. 12
shows this mapping in Gray Code disposition. Gray
coding is used in this mapping so that no two
adjacent symbols differ by more than 1 bit. This
helps in reducing the Bit Error Rate (BER).
Fig. 12 The Constellation of our QPSK mapped in Gray Code
To analyse QPSK signal in term of its BER
consideration, we need:
-Input Data to transmit/modulate with carrier
-Noisy Medium to transfer the data
-Demodulation of transmitted data.
-Comparison of original signal, and the
demodulated signal to calculate the Bit Error Rate
(BER)
For the input signal we can use the following
command:
x_signal = randint(1000,1,4);
To modulate the data against the grey coded
constellation, we can used the
modem.pskmod(M)MATLAB function.
y = modem.pskmod (x_signal,constell_gray);
Then we made a ‘for’ loop, each iteration of the
loop represents the Signal to Noise Ratio (SNR).
for SNR=0:2:10
y_noisy = awgn(y,SNR,'measured');
From the below graphs generated, we can see that
the higher the SNR, the better the received signal:
Fig. 13 The Constellation of our QPSK with SNR=6
Fig. 14 The Constellation of our QPSK with SNR=10
Now we can start the proper analyze using the
Simulink interface.
The output of the Simulink machine provides more
insight into the QPSK modulation technique. Apart
from plotting the modulated and demodulated
signal it also shows the constellation at
transmitter/receiver, and the Error Rate in a very
organized and structured manner. These Simulink
10. models are extracted from the internal library, as
they are inbuilt functions from communication
toolbox of Simulink.
1) Analyze with respect to Error Rate
By simply
grabbing and
dragging the
models stated in
the screenshot
beside, we have
succeed to
determine the
Error Rate, of a
typical QPSK
signal transmitted
through an
AWGN noisy
channel and
demodulated at
reception.
This Error Rate is
displayed on the
Sink provided by
Simulink Library
of Tools, and it
has a figure of
0.752 which is
close to ½ as in
theory. This rate
represents also
the probability of
error occurrence,
in the field of
computing error
statistics
2) Analyze with respect to Possible Transitions
The model in the screenshot beside plots the output
of our QPSK signal using the intrinsic Modulator
Baseband block associated with Simulink.
The image in Fig. 15 shows the possible transitions
from each symbol in the QPSK signal constellation
to the next symbol. And since QPSK is made from
a constellation of four symbols, so we obtain the
shape of a square, with diagonals:
Fig. 15 The
Constellation of
our QPSK Signal
with Transitions
from four
symbols,
generated via the
Complex to
Real-Imaginary
module of
Simulink
3) Analyze with respect to the Scatter Plot
Fig. 16 The
Scatter Plot of
our QPSK Signal
with dispersion
of symbols in the
four coins,
similar to what in
Fig. 10, 14, but
here using the
Scatter Plot
Scope found in
Simulink Library
of Sinks
11. V. CONCLUSION
So far, we have established that PSK modulation
is a very reliable technique of modulation, since the
transmission of data was done in conformity with
the ranges that we have set-up in MATLAB
program code parameters. PSK is hence producing
rugged signals, as they are characterized with an
impressing immunity to noise, such as White
Gaussian Noise or Electromagnetic Noise that we
tried to add to the pure signal generated.
With all this said, we have asserted that the
practical use of PSK modulation is efficient, cost-
effective and simple. And from the simulation
waveforms extracted from MATLAB, we can
clearly see that the transmitted binary data is an
image of the received data, and that they perfectly
match, and no loss in gain is observed, which just
mean that PSK is performing the transmission of
digital signals successfully.
Also concluded, is that among the several flavors of
phase shift keying that are available for use, each
form has its own advantages and disadvantages, and
a choice of the optimum format has to be made for
each digital communications system that is
designed. To make the right choice it is necessary
to have a close-to-reality simulation on MATLAB
or Simulink, beside the knowledge and
understanding of the way in which PSK works.
From our simulations and our related research in
books and articles, we found that, in general the
higher order forms of modulation allow higher data
rates to be carried within a given bandwidth.
However the downside is that the higher data rates
require a better signal to noise ratio before the error
rates start to rise and this counteracts any
improvements in data rate performance. In view of
this balance many radio communications systems
are able to dynamically choose the form of
modulation depending upon the prevailing
conditions and requirements.
All-in-all, this study was very conclusive, and it had
opened our eyes on many facets of PSK and digital
modulation in general, that was ambiguous to us
before. The use of MATLAB and Simulink was
very intuitive and productive, and we have acquired
important skills in writing, analysing and debugging
the codes. In Simulink we have found a more
straight-forward approach which we valorised
tremendously, and we saw solution in it to many
recurrent engineering and communication
problems. MATLAB is definitely the best
alternative to solve modulation-based problems and
to get simulations and results that will help into
improving the communication system developed,
and making crucial decisions on which modulation
technique is to be employed.
VI.REFERENCES
[1] Dennis Silage, Digital Communication Systems using
MATLAB and Simulink
[2] Vinay K. Ingle, Digital Signal Processing Using
MATLAB (Bookware Companion)
[3] Richard C. Jaffe, Random Signals for Engineers Using
MATLAB and Mathcad (Modern Acoustics and Signal
Processing)
[4] Robert J. Schilling, Fundamentals of Digital Signal
Processing Using MATLAB
[5] Martin Schetzen and Vinay K. Ingle, Discrete Systems
Laboratory Using MATLAB
[6] Luis Chaparro, Signals and Systems using MATLAB
[7] Jeruchim, M. C., P. Balaban, and K. S. Shanmugan,
Simulation of Communication Systems, New York,
Plenum Press, 1992.
[8] Proakis, J. G., Digital Communications, 3rd ed., New
York, McGraw-Hill, 1995.
[9] Sklar, B., Digital Communications: Fundamentals and
Applications, Englewood Cliffs, NJ, Prentice-Hall, 1988.
[10] Anderson, J. B., T. Aulin, and C.-E. Sundberg, Digital
Phase Modulation, New York, Plenum Press, 1986.
[11] Biglieri, E., D. Divsalar, P.J. McLane, and M.K. Simon,
Introduction to Trellis-Coded Modulation with
Applications, New York, Macmillan, 1991.
[12] Pawula, R.F., "On M-ary DPSK Transmission Over
Terrestrial and Satellite Channels," IEEE Transactions
on Communications, Vol. COM-32, July 1984, pp. 752–
761.
[13] Smith, J. G., "Odd-Bit Quadrature Amplitude-Shift
Keying," IEEE Transactions on Communications, Vol.
COM-23, March 1975, pp. 385–389.