SlideShare a Scribd company logo
1 of 6
Download to read offline
ISSN: 2278 – 1323
                     International Journal of Advanced Research in Computer Engineering & Technology
                                                                         Volume 1, Issue 4, June 2012


    Bit Error Probability for Wireless Communication by
    using A Two Level FH-CDMA scheme over Fading
                           Channel
                                                  Y Venkatadri and A Mahendran


                                                                       in both schemes, restricting the choice of suitable modulation
                                                                        codes and FH patterns to use.
Abstract— here mainly discussing ‘two-level’ frequency                      In Section II of this paper, we propose a new two-level
hopping code division multiple –access(FH-CDMA) scheme for              FH-CDMA scheme, in which both modulation codes and FH
wireless communication systems and this scheme provides                 patterns do not need to have the same weight or length
flexibility in the selection of modulation codes and FH patterns.       anymore. The only requirement is that the weight of the FH
By partitioning the modulation codes, our two-level scheme can
be modified to support more possible users without increasing
                                                                        patterns is at least equal to the length of the modulation
the number of FH patterns. The performance and spectral                 codes, which is usually true in modulated FH-CDMA
efficiency (SE) of the scheme are analyzed. And results shows           schemes (such as prime/FH-CDMA and RS/FH-CDMA)
that bit error probability for A two level FH-CDMA scheme               because each element of the modulation codes needs to be
over fading channels that is AWGN, Rayleigh and Rician                  conveyed by an element of the FH patterns. Therefore, our
channels .                                                              two-level FH-CDMA scheme is more flexible in the selection
                                                                        of the modulation codes and FH patterns (not limited to prime
   Index Terms—Code division multiple access, code odulation,           or RS sequences only) in order to meet different system
frequency hopping, spectral efficiency.                                 operating requirements. The prime/FH-CDMA and
                                                                        RS/FHCDMA schemes are special cases of the new scheme.
                      I.   INTRODUCTION                                 Also in Section II, we propose a partitioning method on the
                                                                        modulation codes, such that modulation codes with lower
                                                                        cross-correlation values are grouped together. Using different
    FREQUENCY-HOPPING              code-division     multiple           groups of modulation codes as an additional level of address
access(FH-CDMA) provides frequency diversity and helps                  signature, the partitioned two-level FH-CDMA scheme
mitigate multipath fading and diversify interference [1], [2].          allows the assignment of the same FH pattern to multiple
Major advantages of FH-CDMA over direct-sequence                        users, thus increasing the number of possible users. The
CDMA [3], [4]include better resistance to multiple access               performance of our two-level FH-CDMA scheme over
interference (MAI),less stringent power control, and reduced            additive white Gaussian noise (AWGN), and Rayleigh and
near-far problem and multipath interference. By assigning a             Rician fading channels are analyzed algebraically in Section
unique FH pattern to each user, a FH-CDMA system allows                 III. While previous analyses [5], [9], [10] used a constant 𝛽0
multiple users to share the same transmission channel                   (the actual threshold divided by the root-mean-squared
simultaneously [5], [6]. MAI occurs when more than one                  receiver noise) to approximate the false-alarm and deletion
simultaneous users utilize the same carrier frequency in the            probabilities caused by additive noise or fading, we include a
same time slot. “One-hit” FH patterns have been designed in             more accurate model of 𝛽0 (as a function of actual
order to minimize MAI [7], [8]. In addition, Goodman, et al.            signal-to-noise ratio) in the analyses of Section III, better
[5] proposed to add 𝑀-ary frequency-shift-keying (MFSK)                 reflecting the actual effects of false alarms and deletions to
atop FH-CDMA in order to increase data rate by transmitting             the scheme performance. In Section IV, we compare the new
symbols, instead of data bits. Furthermore, the uses of prime           scheme with Goodman’s MFSK/FH-CDMA scheme in terms
and Reed-Solomon (RS) sequences as modulation codes atop                of performance and, a more meaningful metric, spectral
FH-CDMA were proposed [9], [10], in which the symbols                   efficiency (SE). Numerical examples show that our two-level
were represented by non-orthogonal sequences, rather than               FH-CDMA scheme provides a trade-off between
orthogonal MFSK. These prime/FH-CDMA [9] and                            performance and data rate. In the comparison of SE, the
RS/FH-CDMA [10] schemes supported higher data rate than                 partitioned two-level FH-CDMA scheme exhibits better
Goodman’s MFSK/FH-CDMA scheme [5], at the expense of                    system efficiency than Goodman’s MFSK/FH-CDMA
worsened performance. however, the weights and lengths of               scheme under some conditions..
the modulation codes and FH patterns needed to be the same
                                                                        II. NEW TWO-LEVEL FH-CDMA SCHEME DESCRIPTION
                                                                         A. Two-level FH-CDMA Scheme
   Manuscript received May 15, 2012.                                    In our two-level FH-CDMA scheme, the available
Y Venkatadri, Student, Dept of ECE, SITAMS, Chittoor, Andhra Pradesh,   transmission bandwidth is divided into 𝑀 𝑕 frequency bands
,India, +91-9502659515 (yvenkatadrimtech@gmail.com) ,                   with 𝑀 𝑚 carrier frequencies in each band, giving a total of
   K Yogaprasad, Associate Professor, Dept of ECE, SITAMS, Chittoor,     𝑀 𝑚 𝑀 𝑕 carrier frequencies. In the first (modulation) level, a
Andhra Pradesh ,India,(mahendranprofessor@gmail.com)
                                                                        number of serial data bits is grouped together and represented

                                                                                                                                    536
                                                    All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                         International Journal of Advanced Research in Computer Engineering & Technology
                                                                             Volume 1, Issue 4, June 2012
by a symbol. Each symbol is, in turn, represented by a                              example, with 𝑝 = 5 and 𝑤 𝑚 = 4 , Table I shows
modulation code of dimension 𝑀 𝑚 × 𝑀 𝑕 and weight (i.e.,                            twenty-four    (𝑀 𝑚 × 𝐿 𝑚 , 𝑤 𝑚 ,⋋ 𝑎,𝑚 ,⋋ 𝑐,𝑚 ) = (4 × 5,4,0,1)
number of elements) 𝑤 𝑚 , where 𝑀 𝑚 is the number of                                prime sequences, where "𝑥" denotes the drop of the fifth
frequencies, 𝐿 𝑚 is the number of time slots (i.e., code length).                   element in order to have a code weight of four. Using these
The number of data bits that can be represented by a symbol                         prime sequences as the modulation codes, we can support at
depends on the number of available modulation codes. If                             most twenty-four symbols and each symbol represents
there are ∅ 𝑚 available modulation codes, each symbol can                           [𝑙𝑜𝑔2 24] = 4 data bits.
represent up to [𝑙𝑜𝑔2 ∅ 𝑚 ] data bits, where [.] is the floor
function.

                             TABLE I
TWENTY-FIVE (4 × 5, 4, 0, 1) PRIME SEQUENCES, WHICH CAN BE
 ORGANIZED INTO FIVE GROUPS WITH 𝜆, 𝑐,𝑚 = 0 WITHIN EACH
                             GROUP.

               Group0        Group1        Group2        Group3        Group4
        𝑖2       𝑖1 =0         𝑖1 =1         𝑖1 =2         𝑖1 =3         𝑖1 =4
       0       0000x          0123x         02x13         031x2         0x321
       1       1111x          123x0         1302x         1x203         10x32
       2       2222x          23x01         2x130         203x1         210x3
       3       3333x          3x012         302x1         31x20         3210x
       4       xxxxx          x0123         x1302         x2031         x3210


     In the second (FH) level, each user is assigned a unique FH
pattern of dimension 𝑀 𝑕 × 𝐿 𝑕 and weight (i.e., number of
elements) 𝑤 𝑕 , where 𝑀 𝑕 is the number of frequencies, 𝐿 𝑕
is the number of time slots (i.e., pattern length). The elements
in the modulation codes and FH patterns determine the carrier
frequencies of the final FH-CDMA signals. While an element                          Fig. 1. Example of the encoding process of the two-level FH-CDMA scheme
                                                                                      with three simultaneous users. (The shaded columns in the transmitting
of a modulation code defines the carrier frequency used in a                         signals, 𝑇 𝑘 , represent the frequency bands specified by the corresponding
frequency band in a given time slot, an element of the FH                                                  FH patterns, 𝐻 𝑘 , for 𝑘 = {1,2,3} ).
pattern determines which frequency band (out of 𝑀 𝑕 bands)                          As mentioned earlier, we can choose any FH patterns for the
to use. In our scheme, we can choose any families of(𝑀 𝑚 ×                          second level of our two-level FH-CDMA scheme as long as
 𝐿𝑚,𝑤𝑚,⋋𝑎,𝑚,⋋𝑐,𝑚) modulation codes and (𝑀𝑕                                            𝑤 𝑕 ≥ 𝐿 𝑚 To illustrate this, we choose the (𝑀 𝑕 ×
×𝐿𝑕,𝑤𝑕,⋋𝑎,𝑕,⋋𝑐,𝑕), FH patterns as long as 𝑤𝑕 ≥𝐿𝑚, where                              𝑙 𝑕 , 𝑤 𝑕 ,⋋ 𝑎,𝑕 ,⋋ 𝑐,𝑕 ) = (5 × 7,5,0,1) prime sequences as the
⋋ 𝑎,𝑚 (⋋ 𝑎,𝑕 ) and ⋋ 𝑐,𝑚 (⋋ 𝑐,𝑕 ) denote the maximum                                one-hit FH patterns and the top sixteen (𝑀 𝑚 ×
Autocorrelation side lobes and cross-correlation values of the                        𝐿 𝑚 , 𝑤 𝑚 ,⋋ 𝑎,𝑚 ,⋋ 𝑐,𝑚 ) = (4 × 5,4,0,1) prime sequences in
Modulation codes (FH patterns), respectively.                                       Table I as the modulation codes.3 Fig. 1 shows the encoding
To illustrate the main concept of our two-level FH-C DMA                            process of three simultaneous users. If the data symbols of
scheme, we here use prime sequences [8] as the modulation                           these three users at one time instant are “3”, “12”, and “6”,
codes; other codes, such as the RS sequences [7], quadratic                         then we pick 𝑆1 = 𝑆3,0 = (0,3,1, 𝑥, 2) , 𝑆2 = 𝑆2,2 =
congruence codes (QCCs) [11], and multilevel prime codes                            (2, 𝑥, 1,3,0), and 𝑆3 = 𝑆1,1 = 1,2,3, 𝑥, 0 ,as the modulation
(MPCs) [12], can also be used. The prime sequences are                              codes, respectively. Let the one-hit FH patterns of these three
constructed in Galois field 𝐺𝐹(𝑝) of a prime number 𝑝. Each                         users be 𝐻1 = (0,2,4, 𝑥, 1,3, 𝑥) , 𝐻2 = (0,4,1, 𝑥, 2, 𝑥, 3) ,
prime sequence of weight 𝑤 𝑚 = 𝑝 is denoted by 𝑆 𝑖1 ,𝑖2 =                           and 𝐻3 = 3,1, 𝑥, 4,2,0, 𝑥 . The carrier frequency used in
 𝑠 𝑖1 ,𝑖2 ,0 , 𝑠 𝑖1 ,𝑖2 ,1 … … , 𝑠 𝑖1 ,𝑖2 ,𝑙 … … 𝑠 𝑖1 ,𝑖2 ,𝑝−1 ), where the 𝑙 𝑡𝑕    each frequency band in a time slot is determined by
element 𝑠 𝑖1 ,𝑖2 ,𝑙 = 𝑖2                        𝑝 𝑖1          𝑝 𝑙  represents the   superimposing (element-by-element) all 𝑤 𝑚 = 4 elements
                                               𝑡𝑕
frequency used in the 𝑙 position (i.e., time slot) of                               of 𝑆 𝑘 on top of the first 𝑤 𝑚 non-“ 𝑥” elements of 𝑤 𝑚 , and
 𝑆 𝑖1 ,𝑖2 . 𝑖1 , 𝑖2 , 𝑙 ∈ 𝐺𝐹 𝑝 , " 𝑝 "denotes a modulo- 𝑝 addition,                 the “ 𝑥”-elements of 𝑖 produce empty frequency bands in the
and " 𝑝 " denotes a modulo- 𝑝 multiplication. Since these                           final two-level FHCDMA signal, where 𝑘 = {1,2,3} The
prime sequences are used as the modulation codes, each                              shaded columns in the transmitting signals, 𝑇 𝑘 , of Fig. 1
element of 𝑆𝑖1, 𝑖2 determines which carrier frequency of a                          represent the frequency bands specified by the corresponding
frequency band in a given time slot to use. If the number of                        FH patterns, 𝐻 𝑘 , for 𝑘 = {1,2,3}, In summary, the two-level
available carrier frequencies is restricted or the sequence                         FH-CDMA                 signal           can    be         represented        by
weight needs to be varied in order to achieve certain scheme                          𝑇 𝑘 = 𝑇 𝑘,0 , 𝑇 𝑘,1 , … . . , 𝑇 𝑘,𝑖 , … … … … . 𝑇 𝑘,𝐿 𝑕 −1 = 𝑆 𝑘 ∆(𝑀 𝑚 𝐻 𝑘 ) ,
performance, we can always adjust the sequence weight to be                         where 𝑇 𝑘,𝑖 represents the carrier frequency used in the 𝑖 𝑡𝑕
  𝑤 𝑚 < 𝑝 by dropping the largest𝑝 − 𝑤 𝑚 elements in 𝑆 𝑖1 ,𝑖2 . As                  time slot and ∆ denotes the superimpose operation. For
a result, the construction algorithm gives ∅ 𝑚 = 𝑃2 − 𝑃 +                           example, the two-level FH-CDMA signal of the first user is
  𝑤 𝑚 𝑤 𝑕 ≥ 𝐿 𝑚 prime sequences1 of weight 𝑤 𝑚 < 𝑝 and length                       found         to      be        𝑇1 = 0 + 0.4,3 + 2.4,1 + 4.4, 𝑥, 𝑥, 2 + 3.4, 𝑥 =
 𝐿 𝑚 = 𝑝 with ⋋ 𝑐,𝑚 = 1 (i.e., symbol interference).For                             (0,11,17, 𝑥, 𝑥, 14, 𝑥) after superimposition. Similarly, the other


                                                                                                                                                               537
                                                             All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                      International Journal of Advanced Research in Computer Engineering & Technology
                                                                          Volume 1, Issue 4, June 2012
two simultaneous users have 𝑇2 = (2, 𝑥, 5, 𝑥, 11, 𝑥, 12)and                partitioning the modulation codes into several groups and
 𝑇3 = (13,6, 𝑥, 19, 𝑥, 0, 𝑥)                                               each roup contains reduced number of modulation codes with
                                                                           a lower 𝜆𝑐, 𝑚. Each user can now only use one group of
                                                                           modulation codes for symbol representation. In addition to
                                                                           theunique FH pattern assigned to a user, the group of
                                                                           modulation codes that the user can use adds another degree of
                                                                           user addresssignature. The same FH pattern can now be
                                                                           reused by multipleusers as long as they have different groups
                                                                           of modulation codes. Let say there are ∅ 𝑕 FH patterns and
                                                                           ∅ 𝑚 modulation codes with 𝜆⋋ 𝑐,𝑚 . If the modulation codes
                                                                           are partitioned into 𝑡 groups of codes with 𝜆,𝑐,𝑚 . (Usually, the
                                                                           partition results in       𝜆,𝑐,𝑚 =⋋ 𝑐,𝑚 − 1 We can then assign
                                                                           each user with one FH attern and one of these 𝑡 groups of
                                                                           modulation codes, thus supporting a total of 𝑡∅ 𝑕 possible
                                                                           users. The tradeoff is that each group now has at most ∅ 𝑚 𝑡
                                                                           modulation codes and thusthe number of bits per symbol is
                                                                           lowered from 𝑙𝑜𝑔2 ∅ 𝑚             to 𝑙𝑜𝑔2 (∅ 𝑚 𝑡) .

                                                                              For example, the twenty-four ⋋ 𝑐,𝑚 = 1 prime sequences in
                                                                           Table I can be partitioned into five groups of prime
                                                                           sequencesof 𝜆,𝑐,𝑚 = 0 and assigned to five different users
                                                                           with the same FH pattern. Although the number of bits
                                                                           represented by each symbol decreases from 𝑙𝑜𝑔2 24 to
                                                                            𝑙𝑜𝑔2 5 ,the number of possible users is now increased from
                                                                           ∅ 𝑕 to 5∅ 𝑕 . We can also choose the MPCs of length 𝑝 and
  Fig. 2. Example of the decoding and detection process of the two-level
                     FH-CDMA scheme with user 1.                           ⋋ 𝑐,𝑚 = 𝑛      as the modulation codes. As shown in [12], the
                                                                                                                         ′
 In a receiver, the received two-level FH-CDMA signals of                  MPCs can be partitioned into 𝑝 𝑛−𝑛 groups and each group
                                                                                                      ′
all users and effects of MAI, fading, and noise (i.e., hits,               has𝜆,𝑐,𝑚 = 𝑛′ and ∅ 𝑚 = 𝑝 𝑛 +1 ,where 𝑛 > 𝑛′ The number of
deletions,                                                                                                                   ′
and false alarms) are hard limited, dehopped, and finally                  possible users is increased to ∅ 𝑕 𝑝 𝑛−𝑛 ,but the number of bits
                                                                                                                     ′
decoded in order to recover the transmitted data symbols. Fig.             per symbol is reduced to 𝑙𝑜𝑔2 𝑝 𝑛 +1 .
2 illustrates the decoding and detection processes of user
1.The received signal 𝑅 is first hard limited and then
dehopped by user 1’s FH pattern 𝐻1 to give a dehopped                                   III PERFORMANCE ANALYSES
signal 𝑅1 of dimension 4 × 5. The role of the dehopping
process simply brings the frequency bands in each time slot
of 𝑅 back to the baseband, according to the frequency bands                In FH-CDMA systems, MAI depends on the cross correlation
specified by 𝐻1. The elements of 𝑅1 are compared with the                  alues of FH patterns. For our two-level FHCDMA scheme,
elements of all modulation codes in use. The modulation                    the cross-correlation values of the modulation codes impose
code (e.g., 𝑆3,0 , with its elements shown as circles in Fig. 2)           additional (symbol) interference and need to be considered.
with the minimum distance from the shaded slots of 𝑅1 is                   Assume that one-hit FH patterns of dimension 𝑀 𝑕 × 𝐿 𝑕 are
chosen as the recovered symbol. Although the prime                         used and the transmission band is divided into 𝑀 𝑚 𝑀 𝑕
sequences can only support up to ⌊log2( 𝑝2 − 𝑝 + 𝑤𝑚)⌋                      frequencies, in which 𝑀 𝑚 frequencies are used to carry the
                                                                           modulation codes of weight 𝑤 𝑚 . The probability that a
bit/symbol, it is important to point out that our two-level                frequency of an interferer hits with one of the 𝑤 𝑚 frequencies
FH-CDMA scheme allows the use of other codes, such as the                  of the desired user is given by
RS sequences [7], QCCs [11], and MPCs [12], as the
modulation codes. For example, the MPCs have 𝑝 𝑛+1                                                     𝑤 𝑚2
sequences of weight 𝑤 𝑚 = 𝑝 and length 𝐿 𝑚 = 𝑝 with 𝜆𝑐, 𝑚 = 𝑛                                 𝑞=                                               (1)
                                                                                                     𝑀 𝑚 𝑀𝑕 𝐿𝑕
(i.e., symbol interference), where 𝑛 is a natural number. If the           Assume that there are 𝐾 simultaneous users, the probability
MPCs are used as the modulation codes, the date rate can be                that the dehopped signal contains 𝑛 entries in an undesired
increased because the MPCs can support up to 𝑙𝑜𝑔2 𝑝 𝑛+1                    row is given by [13]
bit/symbol at the expense of worsened symbol interference.
                                                                                                𝑛                                        K−1
                                                                                         𝑤𝑚                      𝑛               n−i q
B. Partitioned Two-level FH-CDMA Scheme                                       𝑃 𝑛 =                  (−1) 𝑖          1−q+                      (2)
                                                                                          𝑛                      𝑖                wm
                                                                                               𝑖=0
  In general, the number of possible users in a FH-CDMA                    Over AWGN, and Rayleigh and Rician fading channels, false
system is limited by the number of available FH patterns.                  alarms and deletions may introduce detection errors to the
However, our two-level FH-CDMA scheme can flexibly                         received FH-CDMA signals. A false-alarm probability,𝑝 𝑓 , is
increase the number of possible users by trading for lower                 the probability that a tone is detected in a receiver when none
data rate through a reduction of symbol size. It is done by                has actually been transmitted. A deletion probability,𝑝 𝑑 , is

                                                                                                                                               538
                                                        All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                       International Journal of Advanced Research in Computer Engineering & Technology
                                                                           Volume 1, Issue 4, June 2012
the probability that a receiver missed a transmission tone. For                                                𝑛 min ⁡
                                                                                                                     [𝑛−𝑗 ,𝑤 𝑚 −𝑛]
                                                                                                                                                                     𝑛− 𝑗
these three types of channels, the false-alarm probability is                                     𝑃𝑠 𝑛 =                                       𝑃(𝑛 − 𝑗)
generally given by [14]                                                                                                                                               𝑟
                                                                                                              𝑗 =0           𝑟=0
                                                                                                                                                                            𝑤𝑚 − 𝑛+ 𝑗
                                                2
                                               𝛽0                                                                          × (1 − 𝑝 𝑑 ) 𝑛−𝑗 −𝑟 (𝑝 𝑑 ) 𝑟
                      𝑝 𝑓 = exp −                                                        (3)                                                                                   𝑟+ 𝑗
                                                       2
                                                                                                                           × (1 − 𝑝 𝑓 ) 𝑤 𝑚 −𝑛−𝑟 (𝑝 𝑓 ) 𝑟+𝑗
For an AWGN channel, the deletion probability is given                                                                         𝑤 𝑚 −𝑛 min ⁡
                                                                                                                                          [𝑛+𝑗 ,𝑤 𝑚 −𝑛]
by[15]                                                                                                                                                                                     𝑛+ 𝑗
                                                                                                                           +                                              𝑃(𝑛 + 𝑗)
                                                                                                                                                                                            𝑟
                                                                                                                                   𝑗 =1               𝑟=𝑗
       𝑝𝑑 = 1 − 𝑄           2(𝐸 𝑏         𝑁 𝑜 ). (𝑘 𝑏             𝑤 𝑚) . 𝛽𝑜               4
                                                                                                                                                𝑛+𝑗 −𝑟                      𝑤𝑚 − 𝑛− 𝑗
                                                                                                                           × (1 − 𝑝 𝑑 )                     (𝑝 𝑑 ) 𝑟
                                                                                                                                                                               𝑟+ 𝑗
where 𝛽 𝑜 denotes the actual threshold divided by the                                                                      × (1
rootmean- squared receiver noise, 𝑘 𝑏 is the number of bits                                                                − 𝑝 𝑓 ) 𝑤 𝑚 −𝑛−𝑟 (𝑝 𝑓 ) 𝑟−𝑗                                 (11)
per symbol, 𝐸 𝑏 𝑁 𝑜 is the average bit-to-noise density
                      ∞                       𝑎 2 +𝑥 2
radio,𝑄 𝑎, 𝑏 = 𝑏 𝑥 exp −                𝐼 𝑜 𝑎𝑥 𝑑𝑥 is Marcum’s                                   In FH-CDMA systems, an error occurs when interference
                                   2
 𝑄-function, and 𝐼 𝑜 (. ) is the modified Bessel function of the                                causes undesired rows in the dehopped signal to have equal
first kind and zeroth order. To minimize the error probability,                                 or more entries than the desired rows. In addition, an error
the optimal 𝛽 𝑜 of an AWGN channel should be a function of                                      may still occur in our two-level FH-CDMA scheme even
the signal-to-noise ratio (SNR), (𝐸 𝑏 𝑁 𝑜 ). (𝑘 𝑏 𝑤 𝑚 )     and                                 when the undesired rows have less entries than the desired
can be more accurately written as [14]                                                          rows. It is because the nonzero cross-correlation values of the
                                                                                                modulationcodes add extra undesired entries. To account for
                                       (𝐸 𝑏        𝑁 𝑜 ).(𝑘 𝑏     𝑤 𝑚)                          this, let 𝐴 𝑖𝑧 denote the conditional probability of the number
                 𝛽𝑜 =         2+                                                         (5)    of hits (seen at any one of the incorrect rows) being increased
                                                       2
rather than an inaccurate constant value (i.e., 𝛽 𝑜 = 3, used                                   from z to 𝑧 + 𝑖 , where 𝑖 ∈ [1, 𝜆 𝑐.𝑚 ] . To account for the
in[5], [9], [10]).For a Rayleigh fading channel, the deletion                                   effect of 𝜆 𝑐.𝑚 ≠ 0 we derive a new probability of having a
probability is given by [14]                                                                    peak of z as

                                   −𝛽02                                                               𝑃𝑠′ 𝑧 = 𝐴 𝜆𝑧 𝑐.𝑚 𝑃𝑠 𝑧 − 𝜆 𝑐.𝑚 + 𝐴 𝜆𝑧 𝑐.𝑚 −1 𝑃𝑠 𝑧 − (𝜆 𝑐.𝑚 − 1)
         𝑝 𝑑 = 1 − exp                                   6                                                                                                       𝜆 𝑐.𝑚
                        2 + 2(𝐸 𝑏 𝑁 𝑜 ). (𝑘 𝑏 𝑤 𝑚 )
Similarly, the optimal 𝛽 𝑜 of a Rayleigh fading channel can                                            +⋯……+         𝐴1𝑧     𝑃𝑠 𝑧 − 1 + 1 −                              𝐴 𝑡𝑧+𝑡     𝑃𝑠 𝑧       (12)
be more accurately written as [14]                                                                                                                               𝑡=1
                                                                                                where 𝐴 𝑡𝑧+𝑡 = 0 when 𝑧 + 𝑡 > 𝑤 𝑚 .The computation of 𝐴 𝑡𝑧
                               2                                                                is exampled in Appendix. If there are 2 𝑘 𝑏 − 1 incorrect
  𝛽𝑜 =    2+                                                                                    rows, the probability that n is the maximum number of entries
               (𝐸 𝑏       𝑁 𝑜 ). (𝑘 𝑏         𝑤 𝑚)                                              and that exactly t unwanted rows contain n entries is given by
                                                                                                [5], [8], [15]
                          × log⁡ + (𝐸 𝑏
                               [1                                 𝑁 𝑜 ). (𝑘 𝑏   𝑤 𝑚 )] (7)                                                                                        2 𝑘 𝑏 −1−𝑡
                                                                                                                                                            𝑛−1
                                                                                                                        𝑘𝑏
                                                                                                        𝑃𝑟 (𝑛, 𝑡) = 2        − 1 [𝑃′ 𝑛 ] 𝑡
                                                                                                                                   𝑠                                 𝑃𝑠′ 𝑚                     (13)
Finally, for a Rician fading channel, the deletion probability                                                               𝑡
                                                                                                                                                            𝑚 =0
is given by [14]
                                                                                                Over a noisy or fading channel, the probability of having an
                         2𝜌(𝐸 𝑏 𝑁 𝑜 ). (𝑘 𝑏 𝑤 𝑚 )                                               entry in a desired row is 1 − 𝑝 𝑑 . Therefore, the probability
   𝑝𝑑 = 1− 𝑄                                        , 𝛽                                  (8)    that there exist n entries in a desired row is given by
                      1 + 𝜌 + (𝐸 𝑏 𝑁 𝑜 ). (𝑘 𝑏 𝑤 𝑚 ) 1
                                                                                                                                   𝑤𝑚                        𝑛           𝑤 𝑚 −𝑛
                                                                                                                 𝑃𝑒 (𝑛) =                     1 − 𝑝𝑑               𝑝𝑑                          (14)
Where the Rician factor 𝜌 is given as the ratio of the power in                                                                     𝑛
specular components to the power in multipath components
                                                                                                The desired symbol is detected wherever the maximum
[16]. Similarly, 𝛽 𝑜 and 𝛽1 can be more accurately written as                                   number of entries in the t incorrect rows is less than n. As the
[14, eqn. (7-4-14)]
                                                                                                receiver decides which symbol (out of 2 𝑘 𝑏 symbols) is
                                                                                                recovered by searching for the modulation code with the
                               (𝐸 𝑏      𝑁 𝑜 ).(𝑘 𝑏        𝑤 𝑚)
             𝛽𝑜 =      2+                                                                (9)    largest matching entries, the bit error probability (BEP) is
                                              2
                                                                                                finally given by [5], [8], [15]
                                              𝛽𝑜
              𝛽1 =                                                                      (10)                                              𝑤            2 𝑘 𝑏 −1
                          1+(𝐸 𝑏      𝑁 𝑜 ).(𝑘 𝑏      𝑤 𝑚 ) (1+𝜌)                                            2𝑘𝑏                                                          1
                                                                                                 𝑃𝑏    𝑘 =              1−                     𝑃𝑐 𝑛                          𝑃 𝑛, 𝑡            (15)
                                                                                                           2(2 𝑘 𝑏 − 1)                                                  𝑡+1 𝑟
                                                                                                                                     𝑛=1                    𝑡=0
Including the noise or fading effect, the probability that the
dehopped signal contains 𝑛 entries in an undesired row is
given by [5], [8], [15]

                                                                                                                                                                                               539
                                                                              All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                     International Journal of Advanced Research in Computer Engineering & Technology
                                                                         Volume 1, Issue 4, June 2012


                                                                                                                              0
                                                                                                                          10

    V. PERFORMANCE AND SE COMPARISONS


                                                                                                                              -1
   In this section, we compare the performances of the new                                                                10




                                                                                              Bit Error Probability
two-level FH-CDMA and Goodman’s MFSK/FH-CDMA
schemes under the condition of same transmission
parameters: 𝑀 𝑔 = 𝑀 𝑚 𝑀 𝑕 , 𝐿 𝑔 = 𝐿 𝑕 , and 𝑤 𝑔 = 𝑤 𝑚 , where
  𝑀 𝑔 , 𝐿 𝑔 ,and 𝑤 𝑔   are the number of frequencies, number of                                                           10
                                                                                                                              -2


time slots, and weight of FH patterns utilized by Goodman’s
MFSK/FHCDMA scheme, respectively. As illustrated in
[17], the prime sequences may give at most two hits in
Goodman’s            MFSK/FHCDMA         scheme      under     a                                                              -3
                                                                                                                          10
symbol-asynchronous assumption. The main difference is                                                                             0        10         20          30       40       50         60           70

that Goodman’s MFSK/FH-CDMA scheme supports 𝑀 𝑔                                                                                                             No.of Simultaneous Users

modulation symbols (represented by the orthogonal                   Fig 3: BEPs of the two-level FH-CDMA schemes versus the number of
                                                                   simultaneous users 𝐾 over a Rayleigh fading channel, where 𝑤 𝑚 =
frequencies), while the two-level FH-CDMA scheme                                                                                   𝐸
                                                                   4, 𝑀 𝑚 × 𝐿 𝑚 = 4 × 11, 𝑀 𝑕 × 𝐿 𝑕 = 11 × 47, 𝜌 = 13, 𝐾 𝑏 = 6 𝑎𝑛𝑑 𝑏 =
supports 𝑝2 − 𝑝 + 𝑤 𝑚 symbols with the symbol interference                                                                                                                                              𝑁𝑜
                                                                   25𝑑𝑏
level ⋋ 𝑐,𝑚 = 1 if the prime sequences in Section II are used as
the modulation codes. This symbol interference is accounted                                   10
                                                                                                                      0


for by the probability term 𝑃𝑠′ 𝑧 in (12).

                                                                                                                      -1
                                                                                              10
   In Fig. 3, the BEPs for two level FH-CDMA over a
Rayleigh fading channel are plotted against he number of
                                                                      Bit Error Probability




simultaneous users 𝐾, based on the conditions of same                                                                 -2
number of possible users and same transmission parameters,                                    10

where        𝑤 𝑚 = 4, 𝑀 𝑚 × 𝐿 𝑚 = 4 × 11, 𝑀 𝑕 × 𝐿 𝑕 = 11 ×
                          𝐸
47, 𝜌 = 13, 𝐾 𝑏 = 6 𝑎𝑛𝑑 𝑏 = 25𝑑𝐵 Our partitioned scheme
                              𝑁𝑜                                                                                      -3
                                                                                              10
supports 𝑘 𝑏 = 3 bits/symbol, while Goodman’s scheme
supports 𝑘 𝑏 = 2 bits/symbol. Based on (7) and 𝑘 𝑏 = {5,6},                                                                                                                          Rayleigh channel
                                                                                                                                                                                     Awgn channel
we more accurately calculate 𝛽1 = {3.4633,3.5148} ,                                                                                                                                  Rician channel
respectively, instead of the constant 𝛽 𝑜 = 3 used in [5], [9],
                                                                                                                      -4
                                                                                              10
                                                                                                                          0            10         20          30       40       50         60           70
and [10]                                                                                                                                               No.of Simultaneous Users

                                                                   Fig 4: BEPs of the two-level FH-CDMA scheme versus the number of
                                                                   simultaneous users 𝐾 over AWGN, and Rayleigh and Rician fading
   In Fig. 4, the BEPs of our two-level FH-CDMA scheme             channels,
                                                                    where 𝑤 𝑚 = 4, 𝑀 𝑚 × 𝐿 𝑚 = 4 × 11, 𝑀 𝑕 × 𝐿 𝑕 = 11 × 47, 𝜌 = 13, 𝐾 𝑏 =
under AWGN, and Rayleigh and Rician fading channels are                                              𝐸
                                                                                             6 𝑎𝑛𝑑 𝑏 = 25𝑑𝐵.
plotted against the number of simultaneous users 𝐾, where                                                                                                       𝑁𝑜

 𝑤 𝑚 = 4, 𝑀 𝑚 × 𝐿 𝑚 = 4 × 11, 𝑀 𝑕 × 𝐿 𝑕 = 11 × 47, 𝜌 = 13,
                 𝐸                                                                                                                               V. CONCLUSIONS
  𝐾 𝑏 = 6 𝑎𝑛𝑑 𝑏 = 25𝑑𝐵. Based on (5), (7), (9), and (10),
                𝑁𝑜
we more accurately calculate 𝛽0 and𝛽1 , which are given in            In this paper, we proposed a new two-level FH-CDMA
Fig. 5. As expected, the AWGN curve always performs the            scheme. The prime/FH-CDMA and RS/FH-CDMA schemes
best and the Rayleigh curve performs the worse, while the          were special cases of our scheme. The performance analyses
Rician curve is in between. Also shown in the figure is the        showed that the two-level FH-CDMA scheme provided a
computer-simulation result for validating our theoretical          trade-off between performance and data rate. The partitioned
analysis. To compare our partitioned two-level FH-CDMA             two-level FH-CDMA scheme increased the number of
and Goodman’s MFSK/FH-CDMA schemes,                                possible
                                                                   users and exhibited higher data rate and greater SE than
                            𝐾𝑏 𝐾                                   Goodman’s MFSK/FH-CDMA scheme. In summary, the
                     𝑆𝐸 =                                 (16)
                             𝑀𝐿                                    new scheme offered more flexibility in the design of
                                                                   FH-CDMA systems to meet different operating
                                                                   requirements.
is another figure of merits, which considers the number of                                                                                              REFERENCES
bits per symbol 𝐾 𝑏 , number of simultaneous users 𝐾, number
of carrier frequencies 𝑀, and number of time slots 𝐿 as a           [1] Y. R. Tsai and J. F. Chang, “Using frequency hopping spread spectrum
                                                                        Technique to combat multipath interference in a multi-accessing
whole, for a given performance (i.e., BEP) [18]. Our goal is            environment," IEEE Trans. Veh. Technol., vol. 43, no. 2, pp. 211-222,
to get the SE as large as possible for better system efficiency         May1994.
or utilization.                                                    [2] G. Kaleh, “Frequency-diversity spread-spectrum communication system

                                                                                                                                                                                                         540
                                                All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                        International Journal of Advanced Research in Computer Engineering & Technology
                                                                            Volume 1, Issue 4, June 2012
    to counter band limited Gaussian interference," IEEE Trans. Commune.,
   vol. 44, no. 7, pp. 886-893, July 1996.
[3] J.-Z. Wang and L. B. Milstein, “CDMA overlay situations for
     microcellular
    mobile communications," IEEE Trans. Commun., vol. 43, no.2/3/4, pp.
     603-614, Feb./Mar./Apr. 1995.
[4] J.-Z. Wang and J. Chen, “Performance of wideband CDMA systems
    with complex spreading and imperfect channel estimation," IEEE J. Sel.
   Areas Commun., vol. 19, no. 1, pp. 152-163, Jan. 2001.
[5] D. J. Goodman, P. S. Henry, and V. K. Prabhu, “Frequency-hopping
    Multilevel FSK for mobile radio," Bell Syst. Tech. J., vol. 59, no. 7, pp.
   1257-1275, Sep. 1980.
[6] G. Einarsson, “Address assignment for a time-frequency, coded, spread
     spectrum system," Bell Syst. Tech. J., vol. 59, no. 7, pp. 1241-1255, Sep.
     1980.
[7] S. B. Wicker and V. K. Bhargava (eds.), Reed-Solomon Codes and Their
    Applications. Wiley-IEEE Press, 1999.
[8] G.-C. Yang and W. C. Kwong, Prime Codes with Applications to CDMA
    Optical and Wireless Networks. Norwood, MA: Artech House, 2002.
[9] C.-Y. Chang, C.-C. Wang, G.-C. Yang, M.-F. Lin, Y.-S. Liu, and W. C.
    Kwong, “Frequency-hopping CDMA wireless communication systems
    using prime codes," in Proc. IEEE 63rd Veh. Technol. Conf., pp. 1753-
   1757, May 2006.
[10] M.-F. Lin, G.-C. Yang, C.-Y. Chang, Y.-S. Liu, and W. C. Kwong,
     “Frequency-hopping CDMA with Reed-Solomon code sequences in
     wireless communications," IEEE Trans. Commun., vol. 55, no. 11, pp.
    2052-2055, Nov. 2007.
[11] E. L. Titlebaum and L. H. Sibul, “Time-frequency hop signals–part II:
      coding based upon quadratic congruences," IEEE Trans. Aero.
     Electron.
    Syst., vol. 17, no. 4, pp. 494-500, July 1981.
[12] C.-H. Hsieh, G.-C. Yang, C.-Y. Chang, and W.C. Kwong, “Multilevel
      prime codes for optical CDMA systems," J. Opt. Commun. Netw.,
     vol.1, no. 7, pp. 600-607, Dec. 2009.
[13] G.-C. Yang, S.-Y. Lin, and W. C. Kwong, “MFSK/FH-SSMA wireless
    systems with double media services over fading channels," IEEE
     Trans.Veh. Technol., vol. 49, no. 3, pp. 900-910, May 2000.
[14] M. Schwartz, W. R. Bennett, and S. Stein, Communication Systems and
    Techniques. McGraw-Hill, 1996.
[15] T. Mabuchi, R. Kohno, and H. Imai, “Multiuser detection scheme based
     on canceling co channel interference for MFSK/FH-SSMA system,"
     IEEE J. Sel. Areas Commun., vol. 12, no. 4, pp. 593-604, May 1994.
[16] U. Svasti-Xuto, Q. Wang, and V. K. Bhargava, “Capacity of an
     FHSSMA
     System in different fading environments," IEEE Trans. Veh. Technol.,
     vol. 47, no. 1, pp. 75-83, Feb. 1998.
[17] T.-C. Lin, C.-C. Hsu, C.-Y. Chang, G.-C. Yang, and W. C. Kwong,
     “Study of MFSK/FH-CDMA wireless communication systems without
     symbol-synchronous assumption," in Proc. IEEE Sarnoff Symp., pp. 1-5,
    Apr. 2007.
[18] C.-Y. Chang, H.-T. Chen, G.-C. Yang, and W. C. Kwong, “Spectral
     efficiency study of QC-CHPCs in multirate optical CDMA
     system,"IEEE J. Sel. Areas Commun., vol. 25, no. 9, pp. 118-128, Dec.
     2007




                                                                                                     541
                                                            All Rights Reserved © 2012 IJARCET

More Related Content

What's hot

Design and Performance Evaluation Of Modulation Techniques Suitable For ADSL ...
Design and Performance Evaluation Of Modulation Techniques Suitable For ADSL ...Design and Performance Evaluation Of Modulation Techniques Suitable For ADSL ...
Design and Performance Evaluation Of Modulation Techniques Suitable For ADSL ...Ash Milan
 
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...IJCSEIT Journal
 
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...pijans
 
Fingerprinting Based Indoor Positioning System using RSSI Bluetooth
Fingerprinting Based Indoor Positioning System using RSSI BluetoothFingerprinting Based Indoor Positioning System using RSSI Bluetooth
Fingerprinting Based Indoor Positioning System using RSSI Bluetoothijsrd.com
 
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...TELKOMNIKA JOURNAL
 
Performance Enhancement of MIMO-OFDM using Redundant Residue Number System
Performance Enhancement of MIMO-OFDM using Redundant Residue Number System Performance Enhancement of MIMO-OFDM using Redundant Residue Number System
Performance Enhancement of MIMO-OFDM using Redundant Residue Number System IJECEIAES
 
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...ijistjournal
 
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...ijngnjournal
 
Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers
Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers  Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers
Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers IJECEIAES
 
UFMC system performance improvement using RS codes for 5G communication system
UFMC system performance improvement using RS codes for 5G communication systemUFMC system performance improvement using RS codes for 5G communication system
UFMC system performance improvement using RS codes for 5G communication systemTELKOMNIKA JOURNAL
 

What's hot (18)

E213152
E213152E213152
E213152
 
LTE
LTELTE
LTE
 
Design and Performance Evaluation Of Modulation Techniques Suitable For ADSL ...
Design and Performance Evaluation Of Modulation Techniques Suitable For ADSL ...Design and Performance Evaluation Of Modulation Techniques Suitable For ADSL ...
Design and Performance Evaluation Of Modulation Techniques Suitable For ADSL ...
 
D010231821
D010231821D010231821
D010231821
 
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
 
38 41
38 4138 41
38 41
 
Hg3113981406
Hg3113981406Hg3113981406
Hg3113981406
 
paper1
paper1paper1
paper1
 
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
 
Fingerprinting Based Indoor Positioning System using RSSI Bluetooth
Fingerprinting Based Indoor Positioning System using RSSI BluetoothFingerprinting Based Indoor Positioning System using RSSI Bluetooth
Fingerprinting Based Indoor Positioning System using RSSI Bluetooth
 
MC-cdma
MC-cdmaMC-cdma
MC-cdma
 
B0440711
B0440711B0440711
B0440711
 
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
Joint Fixed Power Allocation and Partial Relay Selection Schemes for Cooperat...
 
Performance Enhancement of MIMO-OFDM using Redundant Residue Number System
Performance Enhancement of MIMO-OFDM using Redundant Residue Number System Performance Enhancement of MIMO-OFDM using Redundant Residue Number System
Performance Enhancement of MIMO-OFDM using Redundant Residue Number System
 
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...
 
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
ESTIMATION AND COMPENSATION OF INTER CARRIER INTERFERENCE IN WIMAX PHYSICAL L...
 
Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers
Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers  Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers
Performances Concatenated LDPC based STBC-OFDM System and MRC Receivers
 
UFMC system performance improvement using RS codes for 5G communication system
UFMC system performance improvement using RS codes for 5G communication systemUFMC system performance improvement using RS codes for 5G communication system
UFMC system performance improvement using RS codes for 5G communication system
 

Viewers also liked

Green Hectares Rural Tech Workshop – Learning Skype
Green Hectares Rural Tech Workshop – Learning SkypeGreen Hectares Rural Tech Workshop – Learning Skype
Green Hectares Rural Tech Workshop – Learning SkypeGreen Hectares
 
Sacos Plasticos
Sacos PlasticosSacos Plasticos
Sacos Plasticosohanabb
 
Green Hectares Presents to Association of Canadian Custom Harvesters 2013 AGM
Green Hectares Presents to Association of Canadian Custom Harvesters 2013 AGMGreen Hectares Presents to Association of Canadian Custom Harvesters 2013 AGM
Green Hectares Presents to Association of Canadian Custom Harvesters 2013 AGMGreen Hectares
 

Viewers also liked (6)

525 529
525 529525 529
525 529
 
Green Hectares Rural Tech Workshop – Learning Skype
Green Hectares Rural Tech Workshop – Learning SkypeGreen Hectares Rural Tech Workshop – Learning Skype
Green Hectares Rural Tech Workshop – Learning Skype
 
95 101
95 10195 101
95 101
 
Sacos Plasticos
Sacos PlasticosSacos Plasticos
Sacos Plasticos
 
Jucecha
JucechaJucecha
Jucecha
 
Green Hectares Presents to Association of Canadian Custom Harvesters 2013 AGM
Green Hectares Presents to Association of Canadian Custom Harvesters 2013 AGMGreen Hectares Presents to Association of Canadian Custom Harvesters 2013 AGM
Green Hectares Presents to Association of Canadian Custom Harvesters 2013 AGM
 

Similar to 536 541

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Performance Improvement Interfering High-Bit-Rate W-CDMA Third-Generation Sma...
Performance Improvement Interfering High-Bit-Rate W-CDMA Third-Generation Sma...Performance Improvement Interfering High-Bit-Rate W-CDMA Third-Generation Sma...
Performance Improvement Interfering High-Bit-Rate W-CDMA Third-Generation Sma...Amitesh Raikwar
 
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...ijcnac
 
Combination of iterative IA precoding and IBDFE based Equalizer for MC-CDMA
Combination of iterative IA precoding and IBDFE based Equalizer for MC-CDMACombination of iterative IA precoding and IBDFE based Equalizer for MC-CDMA
Combination of iterative IA precoding and IBDFE based Equalizer for MC-CDMAEditor IJMTER
 
Peak to Average Power Ratio Reduction in Mc Cdma System by Using Pulse Shapin...
Peak to Average Power Ratio Reduction in Mc Cdma System by Using Pulse Shapin...Peak to Average Power Ratio Reduction in Mc Cdma System by Using Pulse Shapin...
Peak to Average Power Ratio Reduction in Mc Cdma System by Using Pulse Shapin...IOSR Journals
 
Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Editor IJARCET
 
Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Editor IJARCET
 
Error Control and performance Analysis of MIMO-OFDM Over Fading Channels
Error Control and performance Analysis of MIMO-OFDM Over Fading ChannelsError Control and performance Analysis of MIMO-OFDM Over Fading Channels
Error Control and performance Analysis of MIMO-OFDM Over Fading ChannelsIOSR Journals
 
PERFORMANCE OF ITERATIVE LDPC-BASED SPACE-TIME TRELLIS CODED MIMO-OFDM SYSTEM...
PERFORMANCE OF ITERATIVE LDPC-BASED SPACE-TIME TRELLIS CODED MIMO-OFDM SYSTEM...PERFORMANCE OF ITERATIVE LDPC-BASED SPACE-TIME TRELLIS CODED MIMO-OFDM SYSTEM...
PERFORMANCE OF ITERATIVE LDPC-BASED SPACE-TIME TRELLIS CODED MIMO-OFDM SYSTEM...ijcseit
 
Performance evaluation of family of prime sequence codes in an ocdma system
Performance evaluation of family of prime sequence codes in an ocdma systemPerformance evaluation of family of prime sequence codes in an ocdma system
Performance evaluation of family of prime sequence codes in an ocdma systemIAEME Publication
 
Performance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerPerformance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerIOSR Journals
 
Performance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerPerformance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerIOSR Journals
 
Performance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerPerformance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerIOSR Journals
 
RS Codes for Downlink LTE System over LTE-MIMO Channel
RS Codes for Downlink LTE System over LTE-MIMO ChannelRS Codes for Downlink LTE System over LTE-MIMO Channel
RS Codes for Downlink LTE System over LTE-MIMO ChannelTELKOMNIKA JOURNAL
 
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...Cemal Ardil
 
Performance analysis of new binary orthogonal codes for ds cdma communicat
Performance analysis of new binary orthogonal codes for ds cdma communicatPerformance analysis of new binary orthogonal codes for ds cdma communicat
Performance analysis of new binary orthogonal codes for ds cdma communicatIAEME Publication
 
Implementation of High Speed OFDM Transceiver using FPGA
Implementation of High Speed OFDM Transceiver using FPGAImplementation of High Speed OFDM Transceiver using FPGA
Implementation of High Speed OFDM Transceiver using FPGAMangaiK4
 
Analysis of Women Harassment inVillages Using CETD Matrix Modal
Analysis of Women Harassment inVillages Using CETD Matrix ModalAnalysis of Women Harassment inVillages Using CETD Matrix Modal
Analysis of Women Harassment inVillages Using CETD Matrix ModalMangaiK4
 

Similar to 536 541 (20)

International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Performance Improvement Interfering High-Bit-Rate W-CDMA Third-Generation Sma...
Performance Improvement Interfering High-Bit-Rate W-CDMA Third-Generation Sma...Performance Improvement Interfering High-Bit-Rate W-CDMA Third-Generation Sma...
Performance Improvement Interfering High-Bit-Rate W-CDMA Third-Generation Sma...
 
E0532630
E0532630E0532630
E0532630
 
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
Coverage of WCDMA Network Using Different Modulation Techniques with Soft and...
 
Combination of iterative IA precoding and IBDFE based Equalizer for MC-CDMA
Combination of iterative IA precoding and IBDFE based Equalizer for MC-CDMACombination of iterative IA precoding and IBDFE based Equalizer for MC-CDMA
Combination of iterative IA precoding and IBDFE based Equalizer for MC-CDMA
 
Peak to Average Power Ratio Reduction in Mc Cdma System by Using Pulse Shapin...
Peak to Average Power Ratio Reduction in Mc Cdma System by Using Pulse Shapin...Peak to Average Power Ratio Reduction in Mc Cdma System by Using Pulse Shapin...
Peak to Average Power Ratio Reduction in Mc Cdma System by Using Pulse Shapin...
 
Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377
 
Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377
 
Error Control and performance Analysis of MIMO-OFDM Over Fading Channels
Error Control and performance Analysis of MIMO-OFDM Over Fading ChannelsError Control and performance Analysis of MIMO-OFDM Over Fading Channels
Error Control and performance Analysis of MIMO-OFDM Over Fading Channels
 
PERFORMANCE OF ITERATIVE LDPC-BASED SPACE-TIME TRELLIS CODED MIMO-OFDM SYSTEM...
PERFORMANCE OF ITERATIVE LDPC-BASED SPACE-TIME TRELLIS CODED MIMO-OFDM SYSTEM...PERFORMANCE OF ITERATIVE LDPC-BASED SPACE-TIME TRELLIS CODED MIMO-OFDM SYSTEM...
PERFORMANCE OF ITERATIVE LDPC-BASED SPACE-TIME TRELLIS CODED MIMO-OFDM SYSTEM...
 
461 470
461 470461 470
461 470
 
Performance evaluation of family of prime sequence codes in an ocdma system
Performance evaluation of family of prime sequence codes in an ocdma systemPerformance evaluation of family of prime sequence codes in an ocdma system
Performance evaluation of family of prime sequence codes in an ocdma system
 
Performance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerPerformance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical Layer
 
Performance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerPerformance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical Layer
 
Performance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical LayerPerformance Improvement of IEEE 802.22 WRAN Physical Layer
Performance Improvement of IEEE 802.22 WRAN Physical Layer
 
RS Codes for Downlink LTE System over LTE-MIMO Channel
RS Codes for Downlink LTE System over LTE-MIMO ChannelRS Codes for Downlink LTE System over LTE-MIMO Channel
RS Codes for Downlink LTE System over LTE-MIMO Channel
 
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
 
Performance analysis of new binary orthogonal codes for ds cdma communicat
Performance analysis of new binary orthogonal codes for ds cdma communicatPerformance analysis of new binary orthogonal codes for ds cdma communicat
Performance analysis of new binary orthogonal codes for ds cdma communicat
 
Implementation of High Speed OFDM Transceiver using FPGA
Implementation of High Speed OFDM Transceiver using FPGAImplementation of High Speed OFDM Transceiver using FPGA
Implementation of High Speed OFDM Transceiver using FPGA
 
Analysis of Women Harassment inVillages Using CETD Matrix Modal
Analysis of Women Harassment inVillages Using CETD Matrix ModalAnalysis of Women Harassment inVillages Using CETD Matrix Modal
Analysis of Women Harassment inVillages Using CETD Matrix Modal
 

More from Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

More from Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Recently uploaded

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

536 541

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 Bit Error Probability for Wireless Communication by using A Two Level FH-CDMA scheme over Fading Channel Y Venkatadri and A Mahendran  in both schemes, restricting the choice of suitable modulation codes and FH patterns to use. Abstract— here mainly discussing ‘two-level’ frequency In Section II of this paper, we propose a new two-level hopping code division multiple –access(FH-CDMA) scheme for FH-CDMA scheme, in which both modulation codes and FH wireless communication systems and this scheme provides patterns do not need to have the same weight or length flexibility in the selection of modulation codes and FH patterns. anymore. The only requirement is that the weight of the FH By partitioning the modulation codes, our two-level scheme can be modified to support more possible users without increasing patterns is at least equal to the length of the modulation the number of FH patterns. The performance and spectral codes, which is usually true in modulated FH-CDMA efficiency (SE) of the scheme are analyzed. And results shows schemes (such as prime/FH-CDMA and RS/FH-CDMA) that bit error probability for A two level FH-CDMA scheme because each element of the modulation codes needs to be over fading channels that is AWGN, Rayleigh and Rician conveyed by an element of the FH patterns. Therefore, our channels . two-level FH-CDMA scheme is more flexible in the selection of the modulation codes and FH patterns (not limited to prime Index Terms—Code division multiple access, code odulation, or RS sequences only) in order to meet different system frequency hopping, spectral efficiency. operating requirements. The prime/FH-CDMA and RS/FHCDMA schemes are special cases of the new scheme. I. INTRODUCTION Also in Section II, we propose a partitioning method on the modulation codes, such that modulation codes with lower cross-correlation values are grouped together. Using different FREQUENCY-HOPPING code-division multiple groups of modulation codes as an additional level of address access(FH-CDMA) provides frequency diversity and helps signature, the partitioned two-level FH-CDMA scheme mitigate multipath fading and diversify interference [1], [2]. allows the assignment of the same FH pattern to multiple Major advantages of FH-CDMA over direct-sequence users, thus increasing the number of possible users. The CDMA [3], [4]include better resistance to multiple access performance of our two-level FH-CDMA scheme over interference (MAI),less stringent power control, and reduced additive white Gaussian noise (AWGN), and Rayleigh and near-far problem and multipath interference. By assigning a Rician fading channels are analyzed algebraically in Section unique FH pattern to each user, a FH-CDMA system allows III. While previous analyses [5], [9], [10] used a constant 𝛽0 multiple users to share the same transmission channel (the actual threshold divided by the root-mean-squared simultaneously [5], [6]. MAI occurs when more than one receiver noise) to approximate the false-alarm and deletion simultaneous users utilize the same carrier frequency in the probabilities caused by additive noise or fading, we include a same time slot. “One-hit” FH patterns have been designed in more accurate model of 𝛽0 (as a function of actual order to minimize MAI [7], [8]. In addition, Goodman, et al. signal-to-noise ratio) in the analyses of Section III, better [5] proposed to add 𝑀-ary frequency-shift-keying (MFSK) reflecting the actual effects of false alarms and deletions to atop FH-CDMA in order to increase data rate by transmitting the scheme performance. In Section IV, we compare the new symbols, instead of data bits. Furthermore, the uses of prime scheme with Goodman’s MFSK/FH-CDMA scheme in terms and Reed-Solomon (RS) sequences as modulation codes atop of performance and, a more meaningful metric, spectral FH-CDMA were proposed [9], [10], in which the symbols efficiency (SE). Numerical examples show that our two-level were represented by non-orthogonal sequences, rather than FH-CDMA scheme provides a trade-off between orthogonal MFSK. These prime/FH-CDMA [9] and performance and data rate. In the comparison of SE, the RS/FH-CDMA [10] schemes supported higher data rate than partitioned two-level FH-CDMA scheme exhibits better Goodman’s MFSK/FH-CDMA scheme [5], at the expense of system efficiency than Goodman’s MFSK/FH-CDMA worsened performance. however, the weights and lengths of scheme under some conditions.. the modulation codes and FH patterns needed to be the same II. NEW TWO-LEVEL FH-CDMA SCHEME DESCRIPTION A. Two-level FH-CDMA Scheme Manuscript received May 15, 2012. In our two-level FH-CDMA scheme, the available Y Venkatadri, Student, Dept of ECE, SITAMS, Chittoor, Andhra Pradesh, transmission bandwidth is divided into 𝑀 𝑕 frequency bands ,India, +91-9502659515 (yvenkatadrimtech@gmail.com) , with 𝑀 𝑚 carrier frequencies in each band, giving a total of K Yogaprasad, Associate Professor, Dept of ECE, SITAMS, Chittoor, 𝑀 𝑚 𝑀 𝑕 carrier frequencies. In the first (modulation) level, a Andhra Pradesh ,India,(mahendranprofessor@gmail.com) number of serial data bits is grouped together and represented 536 All Rights Reserved © 2012 IJARCET
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 by a symbol. Each symbol is, in turn, represented by a example, with 𝑝 = 5 and 𝑤 𝑚 = 4 , Table I shows modulation code of dimension 𝑀 𝑚 × 𝑀 𝑕 and weight (i.e., twenty-four (𝑀 𝑚 × 𝐿 𝑚 , 𝑤 𝑚 ,⋋ 𝑎,𝑚 ,⋋ 𝑐,𝑚 ) = (4 × 5,4,0,1) number of elements) 𝑤 𝑚 , where 𝑀 𝑚 is the number of prime sequences, where "𝑥" denotes the drop of the fifth frequencies, 𝐿 𝑚 is the number of time slots (i.e., code length). element in order to have a code weight of four. Using these The number of data bits that can be represented by a symbol prime sequences as the modulation codes, we can support at depends on the number of available modulation codes. If most twenty-four symbols and each symbol represents there are ∅ 𝑚 available modulation codes, each symbol can [𝑙𝑜𝑔2 24] = 4 data bits. represent up to [𝑙𝑜𝑔2 ∅ 𝑚 ] data bits, where [.] is the floor function. TABLE I TWENTY-FIVE (4 × 5, 4, 0, 1) PRIME SEQUENCES, WHICH CAN BE ORGANIZED INTO FIVE GROUPS WITH 𝜆, 𝑐,𝑚 = 0 WITHIN EACH GROUP. Group0 Group1 Group2 Group3 Group4 𝑖2 𝑖1 =0 𝑖1 =1 𝑖1 =2 𝑖1 =3 𝑖1 =4 0 0000x 0123x 02x13 031x2 0x321 1 1111x 123x0 1302x 1x203 10x32 2 2222x 23x01 2x130 203x1 210x3 3 3333x 3x012 302x1 31x20 3210x 4 xxxxx x0123 x1302 x2031 x3210 In the second (FH) level, each user is assigned a unique FH pattern of dimension 𝑀 𝑕 × 𝐿 𝑕 and weight (i.e., number of elements) 𝑤 𝑕 , where 𝑀 𝑕 is the number of frequencies, 𝐿 𝑕 is the number of time slots (i.e., pattern length). The elements in the modulation codes and FH patterns determine the carrier frequencies of the final FH-CDMA signals. While an element Fig. 1. Example of the encoding process of the two-level FH-CDMA scheme with three simultaneous users. (The shaded columns in the transmitting of a modulation code defines the carrier frequency used in a signals, 𝑇 𝑘 , represent the frequency bands specified by the corresponding frequency band in a given time slot, an element of the FH FH patterns, 𝐻 𝑘 , for 𝑘 = {1,2,3} ). pattern determines which frequency band (out of 𝑀 𝑕 bands) As mentioned earlier, we can choose any FH patterns for the to use. In our scheme, we can choose any families of(𝑀 𝑚 × second level of our two-level FH-CDMA scheme as long as 𝐿𝑚,𝑤𝑚,⋋𝑎,𝑚,⋋𝑐,𝑚) modulation codes and (𝑀𝑕 𝑤 𝑕 ≥ 𝐿 𝑚 To illustrate this, we choose the (𝑀 𝑕 × ×𝐿𝑕,𝑤𝑕,⋋𝑎,𝑕,⋋𝑐,𝑕), FH patterns as long as 𝑤𝑕 ≥𝐿𝑚, where 𝑙 𝑕 , 𝑤 𝑕 ,⋋ 𝑎,𝑕 ,⋋ 𝑐,𝑕 ) = (5 × 7,5,0,1) prime sequences as the ⋋ 𝑎,𝑚 (⋋ 𝑎,𝑕 ) and ⋋ 𝑐,𝑚 (⋋ 𝑐,𝑕 ) denote the maximum one-hit FH patterns and the top sixteen (𝑀 𝑚 × Autocorrelation side lobes and cross-correlation values of the 𝐿 𝑚 , 𝑤 𝑚 ,⋋ 𝑎,𝑚 ,⋋ 𝑐,𝑚 ) = (4 × 5,4,0,1) prime sequences in Modulation codes (FH patterns), respectively. Table I as the modulation codes.3 Fig. 1 shows the encoding To illustrate the main concept of our two-level FH-C DMA process of three simultaneous users. If the data symbols of scheme, we here use prime sequences [8] as the modulation these three users at one time instant are “3”, “12”, and “6”, codes; other codes, such as the RS sequences [7], quadratic then we pick 𝑆1 = 𝑆3,0 = (0,3,1, 𝑥, 2) , 𝑆2 = 𝑆2,2 = congruence codes (QCCs) [11], and multilevel prime codes (2, 𝑥, 1,3,0), and 𝑆3 = 𝑆1,1 = 1,2,3, 𝑥, 0 ,as the modulation (MPCs) [12], can also be used. The prime sequences are codes, respectively. Let the one-hit FH patterns of these three constructed in Galois field 𝐺𝐹(𝑝) of a prime number 𝑝. Each users be 𝐻1 = (0,2,4, 𝑥, 1,3, 𝑥) , 𝐻2 = (0,4,1, 𝑥, 2, 𝑥, 3) , prime sequence of weight 𝑤 𝑚 = 𝑝 is denoted by 𝑆 𝑖1 ,𝑖2 = and 𝐻3 = 3,1, 𝑥, 4,2,0, 𝑥 . The carrier frequency used in 𝑠 𝑖1 ,𝑖2 ,0 , 𝑠 𝑖1 ,𝑖2 ,1 … … , 𝑠 𝑖1 ,𝑖2 ,𝑙 … … 𝑠 𝑖1 ,𝑖2 ,𝑝−1 ), where the 𝑙 𝑡𝑕 each frequency band in a time slot is determined by element 𝑠 𝑖1 ,𝑖2 ,𝑙 = 𝑖2 𝑝 𝑖1 𝑝 𝑙 represents the superimposing (element-by-element) all 𝑤 𝑚 = 4 elements 𝑡𝑕 frequency used in the 𝑙 position (i.e., time slot) of of 𝑆 𝑘 on top of the first 𝑤 𝑚 non-“ 𝑥” elements of 𝑤 𝑚 , and 𝑆 𝑖1 ,𝑖2 . 𝑖1 , 𝑖2 , 𝑙 ∈ 𝐺𝐹 𝑝 , " 𝑝 "denotes a modulo- 𝑝 addition, the “ 𝑥”-elements of 𝑖 produce empty frequency bands in the and " 𝑝 " denotes a modulo- 𝑝 multiplication. Since these final two-level FHCDMA signal, where 𝑘 = {1,2,3} The prime sequences are used as the modulation codes, each shaded columns in the transmitting signals, 𝑇 𝑘 , of Fig. 1 element of 𝑆𝑖1, 𝑖2 determines which carrier frequency of a represent the frequency bands specified by the corresponding frequency band in a given time slot to use. If the number of FH patterns, 𝐻 𝑘 , for 𝑘 = {1,2,3}, In summary, the two-level available carrier frequencies is restricted or the sequence FH-CDMA signal can be represented by weight needs to be varied in order to achieve certain scheme 𝑇 𝑘 = 𝑇 𝑘,0 , 𝑇 𝑘,1 , … . . , 𝑇 𝑘,𝑖 , … … … … . 𝑇 𝑘,𝐿 𝑕 −1 = 𝑆 𝑘 ∆(𝑀 𝑚 𝐻 𝑘 ) , performance, we can always adjust the sequence weight to be where 𝑇 𝑘,𝑖 represents the carrier frequency used in the 𝑖 𝑡𝑕 𝑤 𝑚 < 𝑝 by dropping the largest𝑝 − 𝑤 𝑚 elements in 𝑆 𝑖1 ,𝑖2 . As time slot and ∆ denotes the superimpose operation. For a result, the construction algorithm gives ∅ 𝑚 = 𝑃2 − 𝑃 + example, the two-level FH-CDMA signal of the first user is 𝑤 𝑚 𝑤 𝑕 ≥ 𝐿 𝑚 prime sequences1 of weight 𝑤 𝑚 < 𝑝 and length found to be 𝑇1 = 0 + 0.4,3 + 2.4,1 + 4.4, 𝑥, 𝑥, 2 + 3.4, 𝑥 = 𝐿 𝑚 = 𝑝 with ⋋ 𝑐,𝑚 = 1 (i.e., symbol interference).For (0,11,17, 𝑥, 𝑥, 14, 𝑥) after superimposition. Similarly, the other 537 All Rights Reserved © 2012 IJARCET
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 two simultaneous users have 𝑇2 = (2, 𝑥, 5, 𝑥, 11, 𝑥, 12)and partitioning the modulation codes into several groups and 𝑇3 = (13,6, 𝑥, 19, 𝑥, 0, 𝑥) each roup contains reduced number of modulation codes with a lower 𝜆𝑐, 𝑚. Each user can now only use one group of modulation codes for symbol representation. In addition to theunique FH pattern assigned to a user, the group of modulation codes that the user can use adds another degree of user addresssignature. The same FH pattern can now be reused by multipleusers as long as they have different groups of modulation codes. Let say there are ∅ 𝑕 FH patterns and ∅ 𝑚 modulation codes with 𝜆⋋ 𝑐,𝑚 . If the modulation codes are partitioned into 𝑡 groups of codes with 𝜆,𝑐,𝑚 . (Usually, the partition results in 𝜆,𝑐,𝑚 =⋋ 𝑐,𝑚 − 1 We can then assign each user with one FH attern and one of these 𝑡 groups of modulation codes, thus supporting a total of 𝑡∅ 𝑕 possible users. The tradeoff is that each group now has at most ∅ 𝑚 𝑡 modulation codes and thusthe number of bits per symbol is lowered from 𝑙𝑜𝑔2 ∅ 𝑚 to 𝑙𝑜𝑔2 (∅ 𝑚 𝑡) . For example, the twenty-four ⋋ 𝑐,𝑚 = 1 prime sequences in Table I can be partitioned into five groups of prime sequencesof 𝜆,𝑐,𝑚 = 0 and assigned to five different users with the same FH pattern. Although the number of bits represented by each symbol decreases from 𝑙𝑜𝑔2 24 to 𝑙𝑜𝑔2 5 ,the number of possible users is now increased from ∅ 𝑕 to 5∅ 𝑕 . We can also choose the MPCs of length 𝑝 and Fig. 2. Example of the decoding and detection process of the two-level FH-CDMA scheme with user 1. ⋋ 𝑐,𝑚 = 𝑛 as the modulation codes. As shown in [12], the ′ In a receiver, the received two-level FH-CDMA signals of MPCs can be partitioned into 𝑝 𝑛−𝑛 groups and each group ′ all users and effects of MAI, fading, and noise (i.e., hits, has𝜆,𝑐,𝑚 = 𝑛′ and ∅ 𝑚 = 𝑝 𝑛 +1 ,where 𝑛 > 𝑛′ The number of deletions, ′ and false alarms) are hard limited, dehopped, and finally possible users is increased to ∅ 𝑕 𝑝 𝑛−𝑛 ,but the number of bits ′ decoded in order to recover the transmitted data symbols. Fig. per symbol is reduced to 𝑙𝑜𝑔2 𝑝 𝑛 +1 . 2 illustrates the decoding and detection processes of user 1.The received signal 𝑅 is first hard limited and then dehopped by user 1’s FH pattern 𝐻1 to give a dehopped III PERFORMANCE ANALYSES signal 𝑅1 of dimension 4 × 5. The role of the dehopping process simply brings the frequency bands in each time slot of 𝑅 back to the baseband, according to the frequency bands In FH-CDMA systems, MAI depends on the cross correlation specified by 𝐻1. The elements of 𝑅1 are compared with the alues of FH patterns. For our two-level FHCDMA scheme, elements of all modulation codes in use. The modulation the cross-correlation values of the modulation codes impose code (e.g., 𝑆3,0 , with its elements shown as circles in Fig. 2) additional (symbol) interference and need to be considered. with the minimum distance from the shaded slots of 𝑅1 is Assume that one-hit FH patterns of dimension 𝑀 𝑕 × 𝐿 𝑕 are chosen as the recovered symbol. Although the prime used and the transmission band is divided into 𝑀 𝑚 𝑀 𝑕 sequences can only support up to ⌊log2( 𝑝2 − 𝑝 + 𝑤𝑚)⌋ frequencies, in which 𝑀 𝑚 frequencies are used to carry the modulation codes of weight 𝑤 𝑚 . The probability that a bit/symbol, it is important to point out that our two-level frequency of an interferer hits with one of the 𝑤 𝑚 frequencies FH-CDMA scheme allows the use of other codes, such as the of the desired user is given by RS sequences [7], QCCs [11], and MPCs [12], as the modulation codes. For example, the MPCs have 𝑝 𝑛+1 𝑤 𝑚2 sequences of weight 𝑤 𝑚 = 𝑝 and length 𝐿 𝑚 = 𝑝 with 𝜆𝑐, 𝑚 = 𝑛 𝑞= (1) 𝑀 𝑚 𝑀𝑕 𝐿𝑕 (i.e., symbol interference), where 𝑛 is a natural number. If the Assume that there are 𝐾 simultaneous users, the probability MPCs are used as the modulation codes, the date rate can be that the dehopped signal contains 𝑛 entries in an undesired increased because the MPCs can support up to 𝑙𝑜𝑔2 𝑝 𝑛+1 row is given by [13] bit/symbol at the expense of worsened symbol interference. 𝑛 K−1 𝑤𝑚 𝑛 n−i q B. Partitioned Two-level FH-CDMA Scheme 𝑃 𝑛 = (−1) 𝑖 1−q+ (2) 𝑛 𝑖 wm 𝑖=0 In general, the number of possible users in a FH-CDMA Over AWGN, and Rayleigh and Rician fading channels, false system is limited by the number of available FH patterns. alarms and deletions may introduce detection errors to the However, our two-level FH-CDMA scheme can flexibly received FH-CDMA signals. A false-alarm probability,𝑝 𝑓 , is increase the number of possible users by trading for lower the probability that a tone is detected in a receiver when none data rate through a reduction of symbol size. It is done by has actually been transmitted. A deletion probability,𝑝 𝑑 , is 538 All Rights Reserved © 2012 IJARCET
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 the probability that a receiver missed a transmission tone. For 𝑛 min ⁡ [𝑛−𝑗 ,𝑤 𝑚 −𝑛] 𝑛− 𝑗 these three types of channels, the false-alarm probability is 𝑃𝑠 𝑛 = 𝑃(𝑛 − 𝑗) generally given by [14] 𝑟 𝑗 =0 𝑟=0 𝑤𝑚 − 𝑛+ 𝑗 2 𝛽0 × (1 − 𝑝 𝑑 ) 𝑛−𝑗 −𝑟 (𝑝 𝑑 ) 𝑟 𝑝 𝑓 = exp − (3) 𝑟+ 𝑗 2 × (1 − 𝑝 𝑓 ) 𝑤 𝑚 −𝑛−𝑟 (𝑝 𝑓 ) 𝑟+𝑗 For an AWGN channel, the deletion probability is given 𝑤 𝑚 −𝑛 min ⁡ [𝑛+𝑗 ,𝑤 𝑚 −𝑛] by[15] 𝑛+ 𝑗 + 𝑃(𝑛 + 𝑗) 𝑟 𝑗 =1 𝑟=𝑗 𝑝𝑑 = 1 − 𝑄 2(𝐸 𝑏 𝑁 𝑜 ). (𝑘 𝑏 𝑤 𝑚) . 𝛽𝑜 4 𝑛+𝑗 −𝑟 𝑤𝑚 − 𝑛− 𝑗 × (1 − 𝑝 𝑑 ) (𝑝 𝑑 ) 𝑟 𝑟+ 𝑗 where 𝛽 𝑜 denotes the actual threshold divided by the × (1 rootmean- squared receiver noise, 𝑘 𝑏 is the number of bits − 𝑝 𝑓 ) 𝑤 𝑚 −𝑛−𝑟 (𝑝 𝑓 ) 𝑟−𝑗 (11) per symbol, 𝐸 𝑏 𝑁 𝑜 is the average bit-to-noise density ∞ 𝑎 2 +𝑥 2 radio,𝑄 𝑎, 𝑏 = 𝑏 𝑥 exp − 𝐼 𝑜 𝑎𝑥 𝑑𝑥 is Marcum’s In FH-CDMA systems, an error occurs when interference 2 𝑄-function, and 𝐼 𝑜 (. ) is the modified Bessel function of the causes undesired rows in the dehopped signal to have equal first kind and zeroth order. To minimize the error probability, or more entries than the desired rows. In addition, an error the optimal 𝛽 𝑜 of an AWGN channel should be a function of may still occur in our two-level FH-CDMA scheme even the signal-to-noise ratio (SNR), (𝐸 𝑏 𝑁 𝑜 ). (𝑘 𝑏 𝑤 𝑚 ) and when the undesired rows have less entries than the desired can be more accurately written as [14] rows. It is because the nonzero cross-correlation values of the modulationcodes add extra undesired entries. To account for (𝐸 𝑏 𝑁 𝑜 ).(𝑘 𝑏 𝑤 𝑚) this, let 𝐴 𝑖𝑧 denote the conditional probability of the number 𝛽𝑜 = 2+ (5) of hits (seen at any one of the incorrect rows) being increased 2 rather than an inaccurate constant value (i.e., 𝛽 𝑜 = 3, used from z to 𝑧 + 𝑖 , where 𝑖 ∈ [1, 𝜆 𝑐.𝑚 ] . To account for the in[5], [9], [10]).For a Rayleigh fading channel, the deletion effect of 𝜆 𝑐.𝑚 ≠ 0 we derive a new probability of having a probability is given by [14] peak of z as −𝛽02 𝑃𝑠′ 𝑧 = 𝐴 𝜆𝑧 𝑐.𝑚 𝑃𝑠 𝑧 − 𝜆 𝑐.𝑚 + 𝐴 𝜆𝑧 𝑐.𝑚 −1 𝑃𝑠 𝑧 − (𝜆 𝑐.𝑚 − 1) 𝑝 𝑑 = 1 − exp 6 𝜆 𝑐.𝑚 2 + 2(𝐸 𝑏 𝑁 𝑜 ). (𝑘 𝑏 𝑤 𝑚 ) Similarly, the optimal 𝛽 𝑜 of a Rayleigh fading channel can +⋯……+ 𝐴1𝑧 𝑃𝑠 𝑧 − 1 + 1 − 𝐴 𝑡𝑧+𝑡 𝑃𝑠 𝑧 (12) be more accurately written as [14] 𝑡=1 where 𝐴 𝑡𝑧+𝑡 = 0 when 𝑧 + 𝑡 > 𝑤 𝑚 .The computation of 𝐴 𝑡𝑧 2 is exampled in Appendix. If there are 2 𝑘 𝑏 − 1 incorrect 𝛽𝑜 = 2+ rows, the probability that n is the maximum number of entries (𝐸 𝑏 𝑁 𝑜 ). (𝑘 𝑏 𝑤 𝑚) and that exactly t unwanted rows contain n entries is given by [5], [8], [15] × log⁡ + (𝐸 𝑏 [1 𝑁 𝑜 ). (𝑘 𝑏 𝑤 𝑚 )] (7) 2 𝑘 𝑏 −1−𝑡 𝑛−1 𝑘𝑏 𝑃𝑟 (𝑛, 𝑡) = 2 − 1 [𝑃′ 𝑛 ] 𝑡 𝑠 𝑃𝑠′ 𝑚 (13) Finally, for a Rician fading channel, the deletion probability 𝑡 𝑚 =0 is given by [14] Over a noisy or fading channel, the probability of having an 2𝜌(𝐸 𝑏 𝑁 𝑜 ). (𝑘 𝑏 𝑤 𝑚 ) entry in a desired row is 1 − 𝑝 𝑑 . Therefore, the probability 𝑝𝑑 = 1− 𝑄 , 𝛽 (8) that there exist n entries in a desired row is given by 1 + 𝜌 + (𝐸 𝑏 𝑁 𝑜 ). (𝑘 𝑏 𝑤 𝑚 ) 1 𝑤𝑚 𝑛 𝑤 𝑚 −𝑛 𝑃𝑒 (𝑛) = 1 − 𝑝𝑑 𝑝𝑑 (14) Where the Rician factor 𝜌 is given as the ratio of the power in 𝑛 specular components to the power in multipath components The desired symbol is detected wherever the maximum [16]. Similarly, 𝛽 𝑜 and 𝛽1 can be more accurately written as number of entries in the t incorrect rows is less than n. As the [14, eqn. (7-4-14)] receiver decides which symbol (out of 2 𝑘 𝑏 symbols) is recovered by searching for the modulation code with the (𝐸 𝑏 𝑁 𝑜 ).(𝑘 𝑏 𝑤 𝑚) 𝛽𝑜 = 2+ (9) largest matching entries, the bit error probability (BEP) is 2 finally given by [5], [8], [15] 𝛽𝑜 𝛽1 = (10) 𝑤 2 𝑘 𝑏 −1 1+(𝐸 𝑏 𝑁 𝑜 ).(𝑘 𝑏 𝑤 𝑚 ) (1+𝜌) 2𝑘𝑏 1 𝑃𝑏 𝑘 = 1− 𝑃𝑐 𝑛 𝑃 𝑛, 𝑡 (15) 2(2 𝑘 𝑏 − 1) 𝑡+1 𝑟 𝑛=1 𝑡=0 Including the noise or fading effect, the probability that the dehopped signal contains 𝑛 entries in an undesired row is given by [5], [8], [15] 539 All Rights Reserved © 2012 IJARCET
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 0 10 V. PERFORMANCE AND SE COMPARISONS -1 In this section, we compare the performances of the new 10 Bit Error Probability two-level FH-CDMA and Goodman’s MFSK/FH-CDMA schemes under the condition of same transmission parameters: 𝑀 𝑔 = 𝑀 𝑚 𝑀 𝑕 , 𝐿 𝑔 = 𝐿 𝑕 , and 𝑤 𝑔 = 𝑤 𝑚 , where 𝑀 𝑔 , 𝐿 𝑔 ,and 𝑤 𝑔 are the number of frequencies, number of 10 -2 time slots, and weight of FH patterns utilized by Goodman’s MFSK/FHCDMA scheme, respectively. As illustrated in [17], the prime sequences may give at most two hits in Goodman’s MFSK/FHCDMA scheme under a -3 10 symbol-asynchronous assumption. The main difference is 0 10 20 30 40 50 60 70 that Goodman’s MFSK/FH-CDMA scheme supports 𝑀 𝑔 No.of Simultaneous Users modulation symbols (represented by the orthogonal Fig 3: BEPs of the two-level FH-CDMA schemes versus the number of simultaneous users 𝐾 over a Rayleigh fading channel, where 𝑤 𝑚 = frequencies), while the two-level FH-CDMA scheme 𝐸 4, 𝑀 𝑚 × 𝐿 𝑚 = 4 × 11, 𝑀 𝑕 × 𝐿 𝑕 = 11 × 47, 𝜌 = 13, 𝐾 𝑏 = 6 𝑎𝑛𝑑 𝑏 = supports 𝑝2 − 𝑝 + 𝑤 𝑚 symbols with the symbol interference 𝑁𝑜 25𝑑𝑏 level ⋋ 𝑐,𝑚 = 1 if the prime sequences in Section II are used as the modulation codes. This symbol interference is accounted 10 0 for by the probability term 𝑃𝑠′ 𝑧 in (12). -1 10 In Fig. 3, the BEPs for two level FH-CDMA over a Rayleigh fading channel are plotted against he number of Bit Error Probability simultaneous users 𝐾, based on the conditions of same -2 number of possible users and same transmission parameters, 10 where 𝑤 𝑚 = 4, 𝑀 𝑚 × 𝐿 𝑚 = 4 × 11, 𝑀 𝑕 × 𝐿 𝑕 = 11 × 𝐸 47, 𝜌 = 13, 𝐾 𝑏 = 6 𝑎𝑛𝑑 𝑏 = 25𝑑𝐵 Our partitioned scheme 𝑁𝑜 -3 10 supports 𝑘 𝑏 = 3 bits/symbol, while Goodman’s scheme supports 𝑘 𝑏 = 2 bits/symbol. Based on (7) and 𝑘 𝑏 = {5,6}, Rayleigh channel Awgn channel we more accurately calculate 𝛽1 = {3.4633,3.5148} , Rician channel respectively, instead of the constant 𝛽 𝑜 = 3 used in [5], [9], -4 10 0 10 20 30 40 50 60 70 and [10] No.of Simultaneous Users Fig 4: BEPs of the two-level FH-CDMA scheme versus the number of simultaneous users 𝐾 over AWGN, and Rayleigh and Rician fading In Fig. 4, the BEPs of our two-level FH-CDMA scheme channels, where 𝑤 𝑚 = 4, 𝑀 𝑚 × 𝐿 𝑚 = 4 × 11, 𝑀 𝑕 × 𝐿 𝑕 = 11 × 47, 𝜌 = 13, 𝐾 𝑏 = under AWGN, and Rayleigh and Rician fading channels are 𝐸 6 𝑎𝑛𝑑 𝑏 = 25𝑑𝐵. plotted against the number of simultaneous users 𝐾, where 𝑁𝑜 𝑤 𝑚 = 4, 𝑀 𝑚 × 𝐿 𝑚 = 4 × 11, 𝑀 𝑕 × 𝐿 𝑕 = 11 × 47, 𝜌 = 13, 𝐸 V. CONCLUSIONS 𝐾 𝑏 = 6 𝑎𝑛𝑑 𝑏 = 25𝑑𝐵. Based on (5), (7), (9), and (10), 𝑁𝑜 we more accurately calculate 𝛽0 and𝛽1 , which are given in In this paper, we proposed a new two-level FH-CDMA Fig. 5. As expected, the AWGN curve always performs the scheme. The prime/FH-CDMA and RS/FH-CDMA schemes best and the Rayleigh curve performs the worse, while the were special cases of our scheme. The performance analyses Rician curve is in between. Also shown in the figure is the showed that the two-level FH-CDMA scheme provided a computer-simulation result for validating our theoretical trade-off between performance and data rate. The partitioned analysis. To compare our partitioned two-level FH-CDMA two-level FH-CDMA scheme increased the number of and Goodman’s MFSK/FH-CDMA schemes, possible users and exhibited higher data rate and greater SE than 𝐾𝑏 𝐾 Goodman’s MFSK/FH-CDMA scheme. In summary, the 𝑆𝐸 = (16) 𝑀𝐿 new scheme offered more flexibility in the design of FH-CDMA systems to meet different operating requirements. is another figure of merits, which considers the number of REFERENCES bits per symbol 𝐾 𝑏 , number of simultaneous users 𝐾, number of carrier frequencies 𝑀, and number of time slots 𝐿 as a [1] Y. R. Tsai and J. F. Chang, “Using frequency hopping spread spectrum Technique to combat multipath interference in a multi-accessing whole, for a given performance (i.e., BEP) [18]. Our goal is environment," IEEE Trans. Veh. Technol., vol. 43, no. 2, pp. 211-222, to get the SE as large as possible for better system efficiency May1994. or utilization. [2] G. Kaleh, “Frequency-diversity spread-spectrum communication system 540 All Rights Reserved © 2012 IJARCET
  • 6. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 4, June 2012 to counter band limited Gaussian interference," IEEE Trans. Commune., vol. 44, no. 7, pp. 886-893, July 1996. [3] J.-Z. Wang and L. B. Milstein, “CDMA overlay situations for microcellular mobile communications," IEEE Trans. Commun., vol. 43, no.2/3/4, pp. 603-614, Feb./Mar./Apr. 1995. [4] J.-Z. Wang and J. Chen, “Performance of wideband CDMA systems with complex spreading and imperfect channel estimation," IEEE J. Sel. Areas Commun., vol. 19, no. 1, pp. 152-163, Jan. 2001. [5] D. J. Goodman, P. S. Henry, and V. K. Prabhu, “Frequency-hopping Multilevel FSK for mobile radio," Bell Syst. Tech. J., vol. 59, no. 7, pp. 1257-1275, Sep. 1980. [6] G. Einarsson, “Address assignment for a time-frequency, coded, spread spectrum system," Bell Syst. Tech. J., vol. 59, no. 7, pp. 1241-1255, Sep. 1980. [7] S. B. Wicker and V. K. Bhargava (eds.), Reed-Solomon Codes and Their Applications. Wiley-IEEE Press, 1999. [8] G.-C. Yang and W. C. Kwong, Prime Codes with Applications to CDMA Optical and Wireless Networks. Norwood, MA: Artech House, 2002. [9] C.-Y. Chang, C.-C. Wang, G.-C. Yang, M.-F. Lin, Y.-S. Liu, and W. C. Kwong, “Frequency-hopping CDMA wireless communication systems using prime codes," in Proc. IEEE 63rd Veh. Technol. Conf., pp. 1753- 1757, May 2006. [10] M.-F. Lin, G.-C. Yang, C.-Y. Chang, Y.-S. Liu, and W. C. Kwong, “Frequency-hopping CDMA with Reed-Solomon code sequences in wireless communications," IEEE Trans. Commun., vol. 55, no. 11, pp. 2052-2055, Nov. 2007. [11] E. L. Titlebaum and L. H. Sibul, “Time-frequency hop signals–part II: coding based upon quadratic congruences," IEEE Trans. Aero. Electron. Syst., vol. 17, no. 4, pp. 494-500, July 1981. [12] C.-H. Hsieh, G.-C. Yang, C.-Y. Chang, and W.C. Kwong, “Multilevel prime codes for optical CDMA systems," J. Opt. Commun. Netw., vol.1, no. 7, pp. 600-607, Dec. 2009. [13] G.-C. Yang, S.-Y. Lin, and W. C. Kwong, “MFSK/FH-SSMA wireless systems with double media services over fading channels," IEEE Trans.Veh. Technol., vol. 49, no. 3, pp. 900-910, May 2000. [14] M. Schwartz, W. R. Bennett, and S. Stein, Communication Systems and Techniques. McGraw-Hill, 1996. [15] T. Mabuchi, R. Kohno, and H. Imai, “Multiuser detection scheme based on canceling co channel interference for MFSK/FH-SSMA system," IEEE J. Sel. Areas Commun., vol. 12, no. 4, pp. 593-604, May 1994. [16] U. Svasti-Xuto, Q. Wang, and V. K. Bhargava, “Capacity of an FHSSMA System in different fading environments," IEEE Trans. Veh. Technol., vol. 47, no. 1, pp. 75-83, Feb. 1998. [17] T.-C. Lin, C.-C. Hsu, C.-Y. Chang, G.-C. Yang, and W. C. Kwong, “Study of MFSK/FH-CDMA wireless communication systems without symbol-synchronous assumption," in Proc. IEEE Sarnoff Symp., pp. 1-5, Apr. 2007. [18] C.-Y. Chang, H.-T. Chen, G.-C. Yang, and W. C. Kwong, “Spectral efficiency study of QC-CHPCs in multirate optical CDMA system,"IEEE J. Sel. Areas Commun., vol. 25, no. 9, pp. 118-128, Dec. 2007 541 All Rights Reserved © 2012 IJARCET