1) The document discusses applying diversity techniques like maximal ratio combining (MRC) to mitigate fading in interleave-division multiple access (IDMA) communication systems.
2) It analyzes both receiver diversity using a 1:2 antenna configuration and transmit diversity using a 2:1 antenna configuration for the MRC approach with IDMA.
3) Simulation results show significant performance improvements when applying MRC diversity to IDMA compared to without diversity, for both random and tree-based interleavers.
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform cscpconf
This paper aims at developing a hybrid image watermarking algorithm which satisfies both
imperceptibility and robustness requirements. In order to achieve our objectives we have used
singular values of Wavelet Transformation’s HL and LH sub bands to embed watermark.
Further to increase and control the strength of the watermark, we use a scale factor. An optimal
watermark embedding method is developed to achieve minimum watermarking distortion. A
secret embedding key is designed to securely embed the fragile watermarks so that the new
method is robust to counterfeiting, even when the malicious attackers are fully aware of the
watermark embedding algorithm. Experimental results are provided in terms of Peak signal to
noise ratio (PSNR), Normalized cross correlation (NCC) and gain factor to demonstrate the
effectiveness of the proposed algorithm. Image operations such as JPEG compression from
malicious image attacks and, thus, can be used for semi-fragile watermarking
ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK IJCNCJournal
Wireless Sensor Network (WSN) is commonly used to collect information from a remote area and one of the most important challenges associated with WSN is to monitor all targets in a given area while maximizing network lifetime. In wireless communication, energy consumption is proportional to the breadth of sensing range and path loss exponent. Hence, the energy consumption of communication can be minimized by varying the sensing range and decreasing the number of messages being sent. Sensing energy can be optimized by reducing the repeated coverage target. In this paper, an Adaptive Sensor Sensing Range (ASSR) technique is proposed to maximize the WSN Lifetime. This work considers a sensor network with an adaptive sensing range that are randomly deployed in the monitoring area. The sensor is adaptive in nature and can be modified in order to save power while achieving maximum time of monitoring to increase the lifetime of WSN network. The objective of ASSR is to find the best sensing range for each sensor to cover all targets in the network, which yields maximize the time of monitoring of all targets and eliminating double sensing for the same target. Experiments were conducted using an NS3 simulator to verify our proposed technique. Results show that ASSR is capable to improve the network lifetime by 20% as compared to other recent techniques in the case of a small network while achieving an 8% improvement for the case of a large networks.
ADAPTIVE RANDOM SPATIAL BASED CHANNEL ESTIMATION (ARSCE) FOR MILLIMETER WAVE ...IJCNCJournal
Millimeter-wave and mMIMO communications are the most essential success systems for next-generation wireless sensor networks to have enormous amounts of accessible throughput and spectrum. Through installing huge antenna arrays at the base station and performing coherent transceiver processing, mMIMO is a potential technology for enhancing the bandwidth efficiency of wireless sensor networks. The use of mmWave frequencies for mMIMO systems solves the problem of high path-loss through offering greater antenna gains. In this work, we provide a design with a random spatial sample structure that incorporates a totally random step before the analogue is received. It contains a totally random step before the analogue received signals are sent into the digital component of the HBF receiver. Adaptive random spatial based channel estimation (ARSCE) is proposed for channel session measurement collection, and an analogue combiner with valves has been used to estimate the signals at each receiving antenna. The proposed optimization problem formulation attempts to discover the orientations and gains of wideband channel routes. In addition, our proposed model has compared to various state-of-art techniques while considering error minimization.
Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...ijwmn
Multi-hop communication systems gained popularity in wireless communications; they can be used to
extend the coverage of the network and reduce the transmitted power. The transmission of data from the
source node to the destination node in multi-hop communications undergoes through intermediate relay
nodes. In this paper, we study the performance of multi-hop communication systems, in terms of average bit
error rate (BER) with Binary frequency shift keying assuming the κ-µ fading channel model. Due to the
difficulty in finding the probability density function (PDF) of the end-to-end signal to noise ratio (SNR) and
hence for the performance metrics, we use Gaussian Mixture (GM) approximation technique to
approximate the PDF of the end to end SNR assuming the κ-µ fading models as weighted sums of Gaussian
distributions. Numerical results are provided for the BER of binary frequency shift keying (BFSK) of
amplify and forward (AF) multi-hop communication systems assuming different values for the fading
parameters (, ) and for different number of hops. Numerical results are validated by comparing them
with simulation results.
SVD Based Robust Digital Watermarking For Still Images Using Wavelet Transform cscpconf
This paper aims at developing a hybrid image watermarking algorithm which satisfies both
imperceptibility and robustness requirements. In order to achieve our objectives we have used
singular values of Wavelet Transformation’s HL and LH sub bands to embed watermark.
Further to increase and control the strength of the watermark, we use a scale factor. An optimal
watermark embedding method is developed to achieve minimum watermarking distortion. A
secret embedding key is designed to securely embed the fragile watermarks so that the new
method is robust to counterfeiting, even when the malicious attackers are fully aware of the
watermark embedding algorithm. Experimental results are provided in terms of Peak signal to
noise ratio (PSNR), Normalized cross correlation (NCC) and gain factor to demonstrate the
effectiveness of the proposed algorithm. Image operations such as JPEG compression from
malicious image attacks and, thus, can be used for semi-fragile watermarking
ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK IJCNCJournal
Wireless Sensor Network (WSN) is commonly used to collect information from a remote area and one of the most important challenges associated with WSN is to monitor all targets in a given area while maximizing network lifetime. In wireless communication, energy consumption is proportional to the breadth of sensing range and path loss exponent. Hence, the energy consumption of communication can be minimized by varying the sensing range and decreasing the number of messages being sent. Sensing energy can be optimized by reducing the repeated coverage target. In this paper, an Adaptive Sensor Sensing Range (ASSR) technique is proposed to maximize the WSN Lifetime. This work considers a sensor network with an adaptive sensing range that are randomly deployed in the monitoring area. The sensor is adaptive in nature and can be modified in order to save power while achieving maximum time of monitoring to increase the lifetime of WSN network. The objective of ASSR is to find the best sensing range for each sensor to cover all targets in the network, which yields maximize the time of monitoring of all targets and eliminating double sensing for the same target. Experiments were conducted using an NS3 simulator to verify our proposed technique. Results show that ASSR is capable to improve the network lifetime by 20% as compared to other recent techniques in the case of a small network while achieving an 8% improvement for the case of a large networks.
ADAPTIVE RANDOM SPATIAL BASED CHANNEL ESTIMATION (ARSCE) FOR MILLIMETER WAVE ...IJCNCJournal
Millimeter-wave and mMIMO communications are the most essential success systems for next-generation wireless sensor networks to have enormous amounts of accessible throughput and spectrum. Through installing huge antenna arrays at the base station and performing coherent transceiver processing, mMIMO is a potential technology for enhancing the bandwidth efficiency of wireless sensor networks. The use of mmWave frequencies for mMIMO systems solves the problem of high path-loss through offering greater antenna gains. In this work, we provide a design with a random spatial sample structure that incorporates a totally random step before the analogue is received. It contains a totally random step before the analogue received signals are sent into the digital component of the HBF receiver. Adaptive random spatial based channel estimation (ARSCE) is proposed for channel session measurement collection, and an analogue combiner with valves has been used to estimate the signals at each receiving antenna. The proposed optimization problem formulation attempts to discover the orientations and gains of wideband channel routes. In addition, our proposed model has compared to various state-of-art techniques while considering error minimization.
Performance Analysis of Bfsk Multi-Hop Communication Systems Over K-μ Fading ...ijwmn
Multi-hop communication systems gained popularity in wireless communications; they can be used to
extend the coverage of the network and reduce the transmitted power. The transmission of data from the
source node to the destination node in multi-hop communications undergoes through intermediate relay
nodes. In this paper, we study the performance of multi-hop communication systems, in terms of average bit
error rate (BER) with Binary frequency shift keying assuming the κ-µ fading channel model. Due to the
difficulty in finding the probability density function (PDF) of the end-to-end signal to noise ratio (SNR) and
hence for the performance metrics, we use Gaussian Mixture (GM) approximation technique to
approximate the PDF of the end to end SNR assuming the κ-µ fading models as weighted sums of Gaussian
distributions. Numerical results are provided for the BER of binary frequency shift keying (BFSK) of
amplify and forward (AF) multi-hop communication systems assuming different values for the fading
parameters (, ) and for different number of hops. Numerical results are validated by comparing them
with simulation results.
Intelligent Approach for Seamless Mobility in Multi Network EnvironmentIDES Editor
Seamless interoperability between two dissimilar
networks requires handoff from one network to the other.
Such handoffs are known as vertical handoffs. Vertical handoff
introduces a shift in the approach to handoffs. It deals with
handoffs between dissimilar networks, such as from an access
point to a base station or vice versa. The integration of diverse
but complementary cellular and wireless technologies in the
next generation of wireless communication systems requires
the design of intelligent vertical handoff decision algorithms
to enable mobile users to seamlessly switch network access
and experience uninterrupted service continuity anywhere
and anytime. This paper provides a vertical handoff decision
algorithm that enables wireless access network selection at a
mobile terminal. Example shows that our proposed vertical
handover algorithm is able to determine the best access
network.
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...IJCNCJournal
Deep learning applications, especially multilayer neural network models, result in network intrusion detection with high accuracy. This study proposes a model that combines a multilayer neural network with Dense Sparse Dense (DSD) multi-stage training to simultaneously improve the criteria related to the performance of intrusion detection systems on a comprehensive dataset UNSW-NB15. We conduct experiments on many neural network models such as Recurrent Neural Network (RNN), Long-Short Term Memory (LSTM), Gated Recurrent Unit (GRU), etc. to evaluate the combined efficiency with each model through many criteria such as accuracy, detection rate, false alarm rate, precision, and F1-Score.
A novel optimal small cells deployment for next-generation cellular networks IJECEIAES
Small-cell-deployments have pulled cellular operators to boost coverage and capacity in high-demand areas (for example, downtown hot spots). The location of these small cells (SCs) should be determined in order to achieve successful deployments. In this paper, we propose a new approach that optimizes small cells deployment in cellular networks to achieve three objectives: reduce the total cost of network installation, balancing the allocation of resources, i.e. placement of each SC and their transmitted power, and providing optimal coverage area with a lower amount of interference between adjacent stations. An accurate formula was obtained to determine the optimum number of SC deployment (NSC). Finally, we derive a mathematical expression to calculate the critical-handoff-point (CHP) for neighboring wireless stations.
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...csandit
Mobile Ad Hoc networks (MANETs) are gaining increased interest due to their wide range of
potential applications in civilian and military sectors. The self-control, self-organization,
topology dynamism, and bandwidth limitation of the wireless communication channel make
implementation of MANETs a challenging task. The Connected Dominating Set (CDS) has been
proposed to facilitate MANETs realization. Minimizing the CDS size has several advantages;
however, this minimization is NP complete problem; therefore, approximation algorithms are
used to tackle this problem. The fastest CDS creation algorithm is Wu and Li algorithm;
however, it generates a relatively high signaling overhead. Utilizing the location information of
network members reduces the signaling overhead of Wu and Li algorithm. In this paper, we
compare the performance of Wu and Li algorithm with its Location-Information-Based version
under two types of Medium Access Control protocols, and several network sizes. The MAC
protocols used are: a virtual ideal MAC protocol, and the IEEE 802.11 MAC protocol. The use
of a virtual ideal MAC enables us to investigate how the real-world performance of these
algorithms deviates from their ideal-conditions counterpart. The simulator used in this research
is the ns-2 network simulator.
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...IJCNCJournal
Compared to 5G, 6G networks will demand even more ambitious reduction in endto-end latency for packet communication. Recent attempts at breaking the barrier of end-to-end millisecond latencies have focused on re-engineering networks using a hybrid approach consisting of an optical-fiber based backbone network architecture coupled with high-speed wireless networks to connect end-devices to the backbone network. In our approach, a wide area network (WAN) is considered with a high-speed optical fiber grid network as its backbone. After messages from a source node enter the backbone network through a local wireless network, these are delivered very fast to an access point in the backbone network closest to the destination node, followed by its transfer to the local wireless network for delivery to the destination node. We propose a novel routing strategy which is based on distributing the messages in the network in such a way that the average queuing delay of the messages through the backbone network is minimized, and also the route discovery time at each router in the backbone network is drastically reduced. Also, multiple messages destined towards a particular destination router in the backbone network are packed together to form a mailbag, allowing further reductions in processing overheads at intermediate routers and pipelining of mailbag formation and route discovery operations in each router. The performance of the proposed approach green based on these ideas has been theoretically analyzed and then simulated using the ns-3 simulator. Our results show that the average end-to-end latency is less than 380 µs (with only 46-79 µs within the backbone network under varying traffic conditions) for a 1 KB packet size, when using a 500 Gbps optical fiber based backbone network laid over a 15 Km × 15 Km area, a 50 Mbps uplink channel from the source to the backbone network, and a 1 Gbps downlink channel from the backbone network to the destination. The significant reduction in end-to-end latency as compared to existing routing solutions clearly demonstrates the potential of our proposed routing strategy for meeting the ultra-low latency requirements of current 5G and future 6G networks, particularly for mobile edge computing (MEC) application scenarios.
Low Memory Low Complexity Image Compression Using HSSPIHT EncoderIJERA Editor
Due to the large requirement for memory and the high complexity of computation, JPEG2000 cannot be used in
many conditions especially in the memory constraint equipment. The line-based W avelet transform was
proposed and accepted because lower memory is required without affecting the result of W avelet transform, In
this paper, the improved lifting schem e is introduced to perform W avelet transform to replace Mallat method
that is used in the original line-based wavelet transform. In this a three-adder unit is adopted to realize lifting
scheme. It can perform wavelet transform with less computation and reduce memory than Mallat algorithm. The
corresponding HS_SPIHT coding is designed here so that the proposed algorithm is more suitable for
equipment. W e proposed a highly scale image compression scheme based on the Set Partitioning in
Hierarchical Trees (SPIHT) algorithm. Our algorithm, called Highly Scalable SPIHT (HS_SPIHT), supports
High Compression efficiency, spatial and SNR scalability and provides l bit stream that can be easily adapted to
give bandwidth and resolution requirements by a simple transcoder (parse). The HS_SPIHT algorithm adds
the spatial scalability feature without sacrificing the S NR embeddedness property as found in the original
SPIHT bit stream. Highly scalable image compression scheme based on the SPIHT algorithm the proposed
algorithm used, highly scalable SPIHT (HS_SPIHT) Algorithm, adds the spatial scalability feature to the SPIHT
algorithm through the introduction of multiple resolution dependent lists and a resolution-dependent sorting
pass. SPIHT keeps the import features of the original SPIHT algorithm such as compression efficiency, full
SNR Scalability and low complexity.
A small vessel detection using a co-located multi-frequency FMCW MIMO radar IJECEIAES
Small vessels detection is a known issue due to its low radar cross section (RCS). An existing shore-based vessel tracking radar is for long-distance commercial vessels detection. Meanwhile, a vessel-mounted radar system known for its reliability has a limitation due to its single radar coverage. The paper presented a co-located frequency modulated continuous waveform (FMCW) maritime radar for small vessel detection utilising a multiple-input multiple-output (MIMO) configuration. The radar behaviour is numerically simulated for detecting a Swerling 1 target which resembles small maritime’s vessels. The simulated MIMO configuration comprised two transmitting and receiving nodes. The proposal is to utilize a multi-frequency FMCW MIMO configuration in a maritime environment by applying the spectrum averaging (SA) to fuse MIMO received signals for range and velocity estimation. The analysis was summarised and displayed in terms of estimation error performance, probability of error and average error. The simulation outcomes an improvement of 2.2 dB for a static target, and 0.1 dB for a moving target, in resulting the 20% probability of range error with the MIMO setup. A moving vessel's effect was observed to degrade the range error estimation performance between 0.6 to 2.7 dB. Meanwhile, the proposed method was proven to improve the 20% probability of velocity error by 1.75 dB. The impact of multi-frequency MIMO was also observed to produce better average error performance.
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...IJCNCJournal
Energy-efficient relaying technology in multi-hop data transmission can help the challenges faced in cellular Vehicle-to-Everything (cellular-V2X) communication. However, due to high demand of emergency service requirements of the systems such as Public Protection and Disaster Relief (PPDR), National Security and Public Safety (NSPS), Intelligent Transport System (ITS) etc., least energy consumed user equipment (UEs)/Vehicular-UEs are required which can either run real-time applications or relay the application data. To support these scenarios, we present a high way based system model in rural area and enhance its scope for applying single-hop direct, relay assisted multi-hop cellular-V2X and Store-CarryForward (SCF) modes of uplink data transmission. We compare the performance of three modes of transmissions in terms of overall energy consumption and overall transmission delay with specific delay constraints of VoIP and video applications. With the varying cell radius and irrespective type of applications, our numerical results, validated with ns-3 show that, least energy is always consumed in SCF mode due to its inherent property but applications suffer a lot due to high delay incurred whereas singlehop direct mode shows the reverse. When compared with cellular-V2X mode, overall transmission delay for single-hop direct mode is acceptable within cell radius 600m but beyond that, relay assisted multi-hop cellular-V2X mode always outperforms (with low latency and moderate energy consumption).
System Identification in GSM/EDGE Receivers Using a Multi-Model ApproachIDES Editor
Model order selection is an important element in
system identification. It is well known that common model
order selection methods such as Akaike’s information
criterion (AIC) and Bayesian’s information criterion (BIC)
neglect relevant information that is available in models of
order different from the one chosen. In this paper the model
order selection problem for receivers similar to those found
in GSM and EDGE systems is reviewed briefly and is solved
with a multi-model approach based on simultaneous
consideration of several models. Two methods are evaluated;
a multi-model noise suppression filter and multi-model soft
combining. The algorithms are implemented and evaluated
by means of simulations. The performance of each method is
analyzed for GSM and EDGE receivers in a link level
simulator. Simulation results show a significant improvement
in performance at the cost of increased computational
complexity for the multi-model approach.
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...IJCNCJournal
An efficient Intrusion Detection System has to be given high priority while connecting systems with a network to prevent the system before an attack happens. It is a big challenge to the network security group to prevent the system from a variable types of new attacks as technology is growing in parallel. In this paper, an efficient model to detect Intrusion is proposed to predict attacks with high accuracy and less false-negative rate by deriving custom features UNSW-CF by using the benchmark intrusion dataset UNSW-NB15. To reduce the learning complexity, Custom Features are derived and then Significant Features are constructed by applying meta-heuristic FPA (Flower Pollination algorithm) and MRMR (Minimal Redundancy and Maximum Redundancy) which reduces learning time and also increases prediction accuracy. ENC (ElasicNet Classifier), KRRC (Kernel Ridge Regression Classifier), IGBC (Improved Gradient Boosting Classifier) is employed to classify the attacks in the datasets UNSW-CF, UNSW and recorded that UNSW-CF with derived custom features using IGBC integrated with FPA provided high accuracy of 97.38% and a low error rate of 2.16%. Also, the sensitivity and specificity rate for IGB attains a high rate of 97.32% and 97.50% respectively.
MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM ijwmn
In recent years, chaotic communication is a hot research topic and it suits better for the emerging wireless networks because of its excellent features. Different chaos based modulation schemes have evolved, of which the CS-DCSK modulation technique provides better BER performance and bandwidth
efficiency, due to its code domain approach. The QCSK modulation technique provides double benefit: higher data rate with similar BER performance and same bandwidth occupation as DCSK. By combining the advantage of code shifted differential chaos shift keying (CS-DCSK) and Quadrature chaos shift keying (QCSK) scheme, a novel modulation scheme called code shifted Quadrature chaos shift keying (CS-QCSK) is proposed and its suitability in a multiuser scenario is tested in this paper. The analytical expressions for the bit-error rate for Multi-user CS-QCSK scheme (MU-CS-QCSK) under Rayleigh
multipath fading channel is derived. The simulation result shows that, in multiuser scenario the proposed method outperforms classical chaotic modulation schemes in terms of bit error rate (BER).
The growing trend of online image sharing and downloads today mandate the need for better encoding and
decoding scheme. This paper looks into this issue of image coding. Multiple Description Coding is an
encoding and decoding scheme that is specially designed in providing more error resilience for data
transmission. The main issue of Multiple Description Coding is the lossy transmission channels. This work
attempts to address the issue of re-constructing high quality image with the use of just one descriptor
rather than the conventional descriptor. This work compare the use of Type I quantizer and Type II
quantizer. We propose and compare 4 coders by examining the quality of re-constructed images. The 4
coders are namely JPEG HH (Horizontal Pixel Interleaving with Huffman Coding) model, JPEG HA
(Horizontal Pixel Interleaving with Arithmetic Encoding) model, JPEG VH (Vertical Pixel Interleaving
with Huffman Encoding) model, and JPEG VA (Vertical Pixel Interleaving with Arithmetic Encoding)
model. The findings suggest that the use of horizontal and vertical pixel interleavings do not affect the
results much. Whereas the choice of quantizer greatly affect its performance.
Dynamic Texture Coding using Modified Haar Wavelet with CUDAIJERA Editor
Texture is an image having repetition of patterns. There are two types, static and dynamic texture. Static texture is an image having repetitions of patterns in the spatial domain. Dynamic texture is number of frames having repetitions in spatial and temporal domain. This paper introduces a novel method for dynamic texture coding to achieve higher compression ratio of dynamic texture using 2D-modified Haar wavelet transform. The dynamic texture video contains high redundant parts in spatial and temporal domain. Redundant parts can be removed to achieve high compression ratios with better visual quality. The modified Haar wavelet is used to exploit spatial and temporal correlations amongst the pixels. The YCbCr color model is used to exploit chromatic components as HVS is less sensitive to chrominance. To decrease the time complexity of algorithm parallel programming is done using CUDA (Compute Unified Device Architecture). GPU contains the number of cores as compared to CPU, which is utilized to reduce the time complexity of algorithms.
OFDM: Modulation Technique for Wireless CommunicationAM Publications
Orthogonal Frequency Division Multiplexing (OFDM) has become the modulation technique for many wireless
communication standards. In a wireless system, a signal transmitted into channel bounces off from various surfaces resulting
in multiple delayed versions of the transmitted signal arriving at the receiver. The multiple signals are received due to the
reflections from large objects, diffraction of electromagnetic waves around objects .This causes the received signal to be
distorted. OFDM provides tolerance to such frequency selective channels and provides high data rates. In this paper we propose to analyze the theory of OFDM, simulate the OFDM transceiver using MATLAB and perform BER analysis.
Intelligent Approach for Seamless Mobility in Multi Network EnvironmentIDES Editor
Seamless interoperability between two dissimilar
networks requires handoff from one network to the other.
Such handoffs are known as vertical handoffs. Vertical handoff
introduces a shift in the approach to handoffs. It deals with
handoffs between dissimilar networks, such as from an access
point to a base station or vice versa. The integration of diverse
but complementary cellular and wireless technologies in the
next generation of wireless communication systems requires
the design of intelligent vertical handoff decision algorithms
to enable mobile users to seamlessly switch network access
and experience uninterrupted service continuity anywhere
and anytime. This paper provides a vertical handoff decision
algorithm that enables wireless access network selection at a
mobile terminal. Example shows that our proposed vertical
handover algorithm is able to determine the best access
network.
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...IJCNCJournal
Deep learning applications, especially multilayer neural network models, result in network intrusion detection with high accuracy. This study proposes a model that combines a multilayer neural network with Dense Sparse Dense (DSD) multi-stage training to simultaneously improve the criteria related to the performance of intrusion detection systems on a comprehensive dataset UNSW-NB15. We conduct experiments on many neural network models such as Recurrent Neural Network (RNN), Long-Short Term Memory (LSTM), Gated Recurrent Unit (GRU), etc. to evaluate the combined efficiency with each model through many criteria such as accuracy, detection rate, false alarm rate, precision, and F1-Score.
A novel optimal small cells deployment for next-generation cellular networks IJECEIAES
Small-cell-deployments have pulled cellular operators to boost coverage and capacity in high-demand areas (for example, downtown hot spots). The location of these small cells (SCs) should be determined in order to achieve successful deployments. In this paper, we propose a new approach that optimizes small cells deployment in cellular networks to achieve three objectives: reduce the total cost of network installation, balancing the allocation of resources, i.e. placement of each SC and their transmitted power, and providing optimal coverage area with a lower amount of interference between adjacent stations. An accurate formula was obtained to determine the optimum number of SC deployment (NSC). Finally, we derive a mathematical expression to calculate the critical-handoff-point (CHP) for neighboring wireless stations.
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...csandit
Mobile Ad Hoc networks (MANETs) are gaining increased interest due to their wide range of
potential applications in civilian and military sectors. The self-control, self-organization,
topology dynamism, and bandwidth limitation of the wireless communication channel make
implementation of MANETs a challenging task. The Connected Dominating Set (CDS) has been
proposed to facilitate MANETs realization. Minimizing the CDS size has several advantages;
however, this minimization is NP complete problem; therefore, approximation algorithms are
used to tackle this problem. The fastest CDS creation algorithm is Wu and Li algorithm;
however, it generates a relatively high signaling overhead. Utilizing the location information of
network members reduces the signaling overhead of Wu and Li algorithm. In this paper, we
compare the performance of Wu and Li algorithm with its Location-Information-Based version
under two types of Medium Access Control protocols, and several network sizes. The MAC
protocols used are: a virtual ideal MAC protocol, and the IEEE 802.11 MAC protocol. The use
of a virtual ideal MAC enables us to investigate how the real-world performance of these
algorithms deviates from their ideal-conditions counterpart. The simulator used in this research
is the ns-2 network simulator.
A Novel Routing Strategy Towards Achieving Ultra-Low End-to-End Latency in 6G...IJCNCJournal
Compared to 5G, 6G networks will demand even more ambitious reduction in endto-end latency for packet communication. Recent attempts at breaking the barrier of end-to-end millisecond latencies have focused on re-engineering networks using a hybrid approach consisting of an optical-fiber based backbone network architecture coupled with high-speed wireless networks to connect end-devices to the backbone network. In our approach, a wide area network (WAN) is considered with a high-speed optical fiber grid network as its backbone. After messages from a source node enter the backbone network through a local wireless network, these are delivered very fast to an access point in the backbone network closest to the destination node, followed by its transfer to the local wireless network for delivery to the destination node. We propose a novel routing strategy which is based on distributing the messages in the network in such a way that the average queuing delay of the messages through the backbone network is minimized, and also the route discovery time at each router in the backbone network is drastically reduced. Also, multiple messages destined towards a particular destination router in the backbone network are packed together to form a mailbag, allowing further reductions in processing overheads at intermediate routers and pipelining of mailbag formation and route discovery operations in each router. The performance of the proposed approach green based on these ideas has been theoretically analyzed and then simulated using the ns-3 simulator. Our results show that the average end-to-end latency is less than 380 µs (with only 46-79 µs within the backbone network under varying traffic conditions) for a 1 KB packet size, when using a 500 Gbps optical fiber based backbone network laid over a 15 Km × 15 Km area, a 50 Mbps uplink channel from the source to the backbone network, and a 1 Gbps downlink channel from the backbone network to the destination. The significant reduction in end-to-end latency as compared to existing routing solutions clearly demonstrates the potential of our proposed routing strategy for meeting the ultra-low latency requirements of current 5G and future 6G networks, particularly for mobile edge computing (MEC) application scenarios.
Low Memory Low Complexity Image Compression Using HSSPIHT EncoderIJERA Editor
Due to the large requirement for memory and the high complexity of computation, JPEG2000 cannot be used in
many conditions especially in the memory constraint equipment. The line-based W avelet transform was
proposed and accepted because lower memory is required without affecting the result of W avelet transform, In
this paper, the improved lifting schem e is introduced to perform W avelet transform to replace Mallat method
that is used in the original line-based wavelet transform. In this a three-adder unit is adopted to realize lifting
scheme. It can perform wavelet transform with less computation and reduce memory than Mallat algorithm. The
corresponding HS_SPIHT coding is designed here so that the proposed algorithm is more suitable for
equipment. W e proposed a highly scale image compression scheme based on the Set Partitioning in
Hierarchical Trees (SPIHT) algorithm. Our algorithm, called Highly Scalable SPIHT (HS_SPIHT), supports
High Compression efficiency, spatial and SNR scalability and provides l bit stream that can be easily adapted to
give bandwidth and resolution requirements by a simple transcoder (parse). The HS_SPIHT algorithm adds
the spatial scalability feature without sacrificing the S NR embeddedness property as found in the original
SPIHT bit stream. Highly scalable image compression scheme based on the SPIHT algorithm the proposed
algorithm used, highly scalable SPIHT (HS_SPIHT) Algorithm, adds the spatial scalability feature to the SPIHT
algorithm through the introduction of multiple resolution dependent lists and a resolution-dependent sorting
pass. SPIHT keeps the import features of the original SPIHT algorithm such as compression efficiency, full
SNR Scalability and low complexity.
A small vessel detection using a co-located multi-frequency FMCW MIMO radar IJECEIAES
Small vessels detection is a known issue due to its low radar cross section (RCS). An existing shore-based vessel tracking radar is for long-distance commercial vessels detection. Meanwhile, a vessel-mounted radar system known for its reliability has a limitation due to its single radar coverage. The paper presented a co-located frequency modulated continuous waveform (FMCW) maritime radar for small vessel detection utilising a multiple-input multiple-output (MIMO) configuration. The radar behaviour is numerically simulated for detecting a Swerling 1 target which resembles small maritime’s vessels. The simulated MIMO configuration comprised two transmitting and receiving nodes. The proposal is to utilize a multi-frequency FMCW MIMO configuration in a maritime environment by applying the spectrum averaging (SA) to fuse MIMO received signals for range and velocity estimation. The analysis was summarised and displayed in terms of estimation error performance, probability of error and average error. The simulation outcomes an improvement of 2.2 dB for a static target, and 0.1 dB for a moving target, in resulting the 20% probability of range error with the MIMO setup. A moving vessel's effect was observed to degrade the range error estimation performance between 0.6 to 2.7 dB. Meanwhile, the proposed method was proven to improve the 20% probability of velocity error by 1.75 dB. The impact of multi-frequency MIMO was also observed to produce better average error performance.
Performance Analysis of Energy Optimized LTE-V2X Networks for Delay Sensitive...IJCNCJournal
Energy-efficient relaying technology in multi-hop data transmission can help the challenges faced in cellular Vehicle-to-Everything (cellular-V2X) communication. However, due to high demand of emergency service requirements of the systems such as Public Protection and Disaster Relief (PPDR), National Security and Public Safety (NSPS), Intelligent Transport System (ITS) etc., least energy consumed user equipment (UEs)/Vehicular-UEs are required which can either run real-time applications or relay the application data. To support these scenarios, we present a high way based system model in rural area and enhance its scope for applying single-hop direct, relay assisted multi-hop cellular-V2X and Store-CarryForward (SCF) modes of uplink data transmission. We compare the performance of three modes of transmissions in terms of overall energy consumption and overall transmission delay with specific delay constraints of VoIP and video applications. With the varying cell radius and irrespective type of applications, our numerical results, validated with ns-3 show that, least energy is always consumed in SCF mode due to its inherent property but applications suffer a lot due to high delay incurred whereas singlehop direct mode shows the reverse. When compared with cellular-V2X mode, overall transmission delay for single-hop direct mode is acceptable within cell radius 600m but beyond that, relay assisted multi-hop cellular-V2X mode always outperforms (with low latency and moderate energy consumption).
System Identification in GSM/EDGE Receivers Using a Multi-Model ApproachIDES Editor
Model order selection is an important element in
system identification. It is well known that common model
order selection methods such as Akaike’s information
criterion (AIC) and Bayesian’s information criterion (BIC)
neglect relevant information that is available in models of
order different from the one chosen. In this paper the model
order selection problem for receivers similar to those found
in GSM and EDGE systems is reviewed briefly and is solved
with a multi-model approach based on simultaneous
consideration of several models. Two methods are evaluated;
a multi-model noise suppression filter and multi-model soft
combining. The algorithms are implemented and evaluated
by means of simulations. The performance of each method is
analyzed for GSM and EDGE receivers in a link level
simulator. Simulation results show a significant improvement
in performance at the cost of increased computational
complexity for the multi-model approach.
AN EFFICIENT INTRUSION DETECTION SYSTEM WITH CUSTOM FEATURES USING FPA-GRADIE...IJCNCJournal
An efficient Intrusion Detection System has to be given high priority while connecting systems with a network to prevent the system before an attack happens. It is a big challenge to the network security group to prevent the system from a variable types of new attacks as technology is growing in parallel. In this paper, an efficient model to detect Intrusion is proposed to predict attacks with high accuracy and less false-negative rate by deriving custom features UNSW-CF by using the benchmark intrusion dataset UNSW-NB15. To reduce the learning complexity, Custom Features are derived and then Significant Features are constructed by applying meta-heuristic FPA (Flower Pollination algorithm) and MRMR (Minimal Redundancy and Maximum Redundancy) which reduces learning time and also increases prediction accuracy. ENC (ElasicNet Classifier), KRRC (Kernel Ridge Regression Classifier), IGBC (Improved Gradient Boosting Classifier) is employed to classify the attacks in the datasets UNSW-CF, UNSW and recorded that UNSW-CF with derived custom features using IGBC integrated with FPA provided high accuracy of 97.38% and a low error rate of 2.16%. Also, the sensitivity and specificity rate for IGB attains a high rate of 97.32% and 97.50% respectively.
MULTIUSER BER ANALYSIS OF CS-QCSK MODULATION SCHEME IN A CELLULAR SYSTEM ijwmn
In recent years, chaotic communication is a hot research topic and it suits better for the emerging wireless networks because of its excellent features. Different chaos based modulation schemes have evolved, of which the CS-DCSK modulation technique provides better BER performance and bandwidth
efficiency, due to its code domain approach. The QCSK modulation technique provides double benefit: higher data rate with similar BER performance and same bandwidth occupation as DCSK. By combining the advantage of code shifted differential chaos shift keying (CS-DCSK) and Quadrature chaos shift keying (QCSK) scheme, a novel modulation scheme called code shifted Quadrature chaos shift keying (CS-QCSK) is proposed and its suitability in a multiuser scenario is tested in this paper. The analytical expressions for the bit-error rate for Multi-user CS-QCSK scheme (MU-CS-QCSK) under Rayleigh
multipath fading channel is derived. The simulation result shows that, in multiuser scenario the proposed method outperforms classical chaotic modulation schemes in terms of bit error rate (BER).
The growing trend of online image sharing and downloads today mandate the need for better encoding and
decoding scheme. This paper looks into this issue of image coding. Multiple Description Coding is an
encoding and decoding scheme that is specially designed in providing more error resilience for data
transmission. The main issue of Multiple Description Coding is the lossy transmission channels. This work
attempts to address the issue of re-constructing high quality image with the use of just one descriptor
rather than the conventional descriptor. This work compare the use of Type I quantizer and Type II
quantizer. We propose and compare 4 coders by examining the quality of re-constructed images. The 4
coders are namely JPEG HH (Horizontal Pixel Interleaving with Huffman Coding) model, JPEG HA
(Horizontal Pixel Interleaving with Arithmetic Encoding) model, JPEG VH (Vertical Pixel Interleaving
with Huffman Encoding) model, and JPEG VA (Vertical Pixel Interleaving with Arithmetic Encoding)
model. The findings suggest that the use of horizontal and vertical pixel interleavings do not affect the
results much. Whereas the choice of quantizer greatly affect its performance.
Dynamic Texture Coding using Modified Haar Wavelet with CUDAIJERA Editor
Texture is an image having repetition of patterns. There are two types, static and dynamic texture. Static texture is an image having repetitions of patterns in the spatial domain. Dynamic texture is number of frames having repetitions in spatial and temporal domain. This paper introduces a novel method for dynamic texture coding to achieve higher compression ratio of dynamic texture using 2D-modified Haar wavelet transform. The dynamic texture video contains high redundant parts in spatial and temporal domain. Redundant parts can be removed to achieve high compression ratios with better visual quality. The modified Haar wavelet is used to exploit spatial and temporal correlations amongst the pixels. The YCbCr color model is used to exploit chromatic components as HVS is less sensitive to chrominance. To decrease the time complexity of algorithm parallel programming is done using CUDA (Compute Unified Device Architecture). GPU contains the number of cores as compared to CPU, which is utilized to reduce the time complexity of algorithms.
OFDM: Modulation Technique for Wireless CommunicationAM Publications
Orthogonal Frequency Division Multiplexing (OFDM) has become the modulation technique for many wireless
communication standards. In a wireless system, a signal transmitted into channel bounces off from various surfaces resulting
in multiple delayed versions of the transmitted signal arriving at the receiver. The multiple signals are received due to the
reflections from large objects, diffraction of electromagnetic waves around objects .This causes the received signal to be
distorted. OFDM provides tolerance to such frequency selective channels and provides high data rates. In this paper we propose to analyze the theory of OFDM, simulate the OFDM transceiver using MATLAB and perform BER analysis.
Performance of the MIMO-MC-CDMA System with MMSE EqualizationTamilarasan N
Multipath fading and spectral crowding are the
major challenges in dealing higher data rate in future
broadband wireless communication system. Multi-carrier
Modulation like Multicarrier code division multiple access
(MC-CDMA) can tackle the problem and provide higher data
rate for future wireless communication system. However,
through a frequency selective fading channel, the subcarriers
in MC-CDMA signal have different amplitude levels and phase
shifts which result in loss of the orthogonality among users
and generates Multiple access interference (MAI). To combat
the MAI, various amplitude and phase equalizing techniques
such as Maximum Ratio Combining (MRC), Equal Gain
Combining (EGC), Orthogonal Restoring Combining (ORC),
Threshold Orthogonal Restoring Combining or Minimum
Mean Square Error (MMSE) may be used. Out of these MMSE
offers better performance since the MMSE criterion is applied
independently on each subcarrier. Further improvement in
performance is possible through space–time block coding,
which offers maximum diversity gain and multiplexing gain.
This paper combines MC-CDMA with MMSE equalization
and space–time block coding which proves to be a powerful
physical layer solution in combating delay spread and inter
symbol interference (ISI).
Diversity combining is a technique in wireless network that uses multiple antenna system to improve the quality of radio signal. Mobile radio system suffers multipath propagation due to signal obstruction in the channel. A new hybridized diversity combining scheme consisting of Equal Gain Combining (EGC) and Maximal Ratio Combining (MRC) was proposed in this paper. Theperformance of the hybrid model was evaluated using Outage Probability (Pout) and Processing time (Pt) at different Signal-to-Noise Ratio (SNR) and Signal Paths (L=2,3) for 4-QAM and 8-QAM Modulation Schemes. A mathematical expression for the hybrid EGC-MRC was realized using the Probability Density Function (PDF) of the Nakagami fading channel. MATLAB R2015b software was used for the model simulation. The result shows that hybrid EGC-MRC outperforms the standalone EGC and MRC schemes by having lower Pout and Pt values. Hence, hybrid EGC-MRC exhibits enhanced potentials to mitigate multipath propagation at reduced system complexity.
A NEW HYBRID DIVERSITY COMBINING SCHEME FOR MOBILE RADIO COMMUNICATION SYSTEM...ijcsit
Diversity combining is a technique in wireless network that uses multiple antenna system to improve the quality of radio signal. Mobile radio system suffers multipath propagation due to signal obstruction in the channel. A new hybridized diversity combining scheme consisting of Equal Gain Combining (EGC) and Maximal Ratio Combining (MRC) was proposed in this paper. Theperformance of the hybrid model was evaluated using Outage Probability (Pout) and Processing time (Pt) at different Signal-to-Noise Ratio (SNR) and Signal Paths (L=2,3) for 4-QAM and 8-QAM Modulation Schemes. A mathematical expression for the hybrid EGC-MRC was realized using the Probability Density Function (PDF) of the Nakagami fading channel. MATLAB R2015b software was used for the model simulation. The result shows that hybrid EGC-MRC outperforms the standalone EGC and MRC schemes by having lower Pout and Pt values. Hence, hybrid EGC-MRC exhibits enhanced potentials to mitigate multipath propagation at reduced
system complexity.
Peak to Average Power Ratio Reduction in Mc Cdma System by Using Pulse Shapin...IOSR Journals
Abstract: One of the drawback of multicarrier code division multiple access (MC CDMA) is the high peak to
average power ratio (PAPR). In this paper A novel scheme based on pulse shaping described for PAPR
reduction. Here three different pulse shaping filters (Raised cosine, Sinc power pulse and Nyqist pulse) are
described for PAPR reduction in MC CDMA system. The method is based on the proper selection of the pulses
for shaping the different sub carriers of the MC CDMA modulation scheme. It is shown by computer simulation
that the scheme achieves the significant improvement in PAPR reduction in MC CDMA system. Its
implementation complexity is much low in comparison to the previous published methods. Thus pulse shaping
technique can be used not only to shape the spectrum of the transmitted signal but also to reduce its PAPR. In
computer simulation It is observed that by using nyquist pulse near about 6.8 db PAPR is obtained. Which is
considerable PAPR reduction than a PAPR value of Original MC CDMA signal
Keywords: MC CDMA, PAPR, PULSE SHAPING, BPSK
Multiuser Detection with Decision-feedback Detectors and PIC in MC-CDMA SystemTELKOMNIKA JOURNAL
In this paper we propose an iterative parallel decision feedback (P-DF) receivers associated with
parallel interference cancellation (PIC) for multicarrier code division multiple access (MC-CDMA) systems
in a Rayleigh fading channel (cost 207). First the most widely detection techniques, minimum
mean-squared error MMSE, Maximum Likelihood ML and PIC were investigated in order to compare their
performances in terms of Bit Error Rate (BER) with parallel feedback detection P-DFD. A MMSE DF
detector that employs parallel decision-feedback (MMSE-P-DFD) is considered and shows almost the
same BER performance with MMSE and ML, which present a better result than the other techniques. In a
second time, an iterative proposed method based on the multi-stage techniques P-DFD
(parallel DFD with two stages) and PIC was exploited to improve the performance of the system.
Multi User Detection in CDMA System Using Linear and Non Linear DetectorWaqas Tariq
DS-Code division multiple access is considered as the third generation of cellular mobile used in interim standard 95(IS-95) [1]and it is currently being standardized for universal mobile telecommunication systems (UMTS). CDMA offers attractive features, such as frequency reuse, soft handoff, increased capacity, and multipath combating. In a CDMA system, several users simultaneously transmit information over a common channel using pre-assigned codes. The conventional single user detector consists of a bank of filters matched to the spreading codes. This detector suffers from two problems. First, multiple access interference (MAI) produced by the other co-channel users is a significant limitation to the capacity of this detector. The second problem is the near-far effect which occurs when the relative received power of interfering signals becomes larger. A potential solution is multi-user detection which exploits the information of signals of interfering users. In the present study performance of various linear detectors like matched filter detector, MMSE detector, and adaptive LMS detector are studied. These are the linear detectors that operate linearly on the received signal statistics and are suboptimal detectors. The matched filter bank is the conventional detector and offers the simplest way of demodulating CDMA signals .The detector resulting from the MMSE (minimum mean square error) criterion shows better performance over the conventional one for low SNR value. Adaptive LMS is employed to enhance the BER performance in MUD application.Several factors motivated the research to apply neural network as multi-user detector. NN are nonlinear classifier in addition to being adaptive and computationally efficient. The performance of two layer perceptron neural network using BP learning rule is used for multi-user detection of CDMA signals in AWGN channels. The neural network detectors show improvement of BER in the comparative analysis done in the present work. and offers further research scope for solving multi-user detection problems in CDMA application.
In OFDM-IDMA scheme, intersymbol interference (ISI) is resolved by the OFDM layer and multiple access interference (MAI) is suppressed by the IDMA layer at low cost . However OFDM-IDMA scheme suffers high peakto-average power ratio (PAPR) problem. For removing high PAPR problem a hybrid multiple access scheme SC-FDM-IDMA has been proposed. In this paper, bit error rate (BER) performance comparison of SC-FDM-IDMA scheme, OFDM-IDMA scheme and IDMA scheme have been duly presented. Moreover, the BER performance of various subcarrier mapping methods for SC-FDM-IDMA scheme as well as other results with variation of different parameters have also been demonstrated. Finally simulation result for BER performance improvement has been shown employing BCH code. All the simulation results demonstrate the suitability of SC-FDMIDMA scheme for wireless communication under AWGN channel environment.
MULTI USER DETECTOR IN CDMA USING ELLIPTIC CURVE CRYPTOGRAPHYVLSICS Design
Code division multiple access (CDMA) is used in various radio communication techniques due to its advantages. In CDMA one of the most important processes is multi user detection (MUD). There are numerous methods for MUD in CDMA, but in most of the methods, they identify the exact user but the interference signal is high. One of the methods used for MUD in CDM A is elliptic curve cryptography (ECC). Normally, the multi user detector in CDMA using elliptic curve cryptography is performed by using one prime field. In ECC method the exact user is identified and also interference signal reduces comparing with other techniques. To reduce the interference signal to very low, here propose a new technique for MUD in CDMA using ECC. The proposed technique uses multiple prime numbers for key generation. By generating key using different prime numbers using ECC, the bit error rate was very low. The results shows the performance of the proposed for reduce in bit error rate for MUD in CDMA.
PERFORMANCE EVALUATION OF MC-CDMA SYSTEM OVER RAYLEIGH FADING CHANNELIJCSES Journal
Multi Carrier Code Division Multiple Access (MC-CDMA) is a well known technique for high speed
wireless data transmission .Two advanced technology was included in the MC-CDMA structure, such as
orthogonal frequency division multiplex (OFDM) and the code division multiple access (CDMA),so that it
benefits from the robustness of OFDM against multipath environment and from the capability of multiuser
multiplexing services that is achieved via (CDMA) system. MC-CDMA is a multicarrier spread spectrum
system which is classified as the candidate scheme for future mobile radio systems. In this paper MCCDMA
system, with Rayleigh fading channel and 16QAM array modulation, was simulated to investigate
the effects of different parameters on the system performance, such as processing gain; number of paths;
number of users; interleaving; and coding ratio.MC-CDMA performances can be considerably improved
by proper selection of these parameters. As expected, results show that MC-CDMA has a better performance over CDMA system.
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...eSAT Journals
Abstract The design of Multi Carrier Direct Sequence Code Division Multiple Access (MC-DS-CDMA) structure which generalizes serial and parallel concatenated code is investigated to this project. This model is ideal for designing various codes in the performance of both error floor and water floor region. We propose a concatenated code for transmitter block which is used for multi carrier direct sequence CDMA technique. Simulation results of MC-DS-CDMA uplink system using Cadence software shows the various parameters such as memory, Execution time and number of transient steps required for the Execution of MC-DS-CDMA uplink system was estimated and also power consumed was determined for each block in the transmitter. An improved concatenated code model is used for uplink mobile communication. Further system performance improvements can be obtained by concatenating inner code and outer code and the results of computer simulations demonstrate that the performance of the concatenated code was investigated. Keywords: Code Division Multiple Access, Concatenated code, inner code, outer code, interleaving and power analysis.
Block diagonalization precoding and power allocation for clustering small-cel...journalBEEI
The clustering network is a solution to improve data-rate transmission in small-cells. In this case, clustering small-cells (CSCs) adopt a multiple antennas concept. The multiple antennas are used to maximize the downlink data-rate transmission at the users, but it requires precoding techniques to minimize interference among CSC users. This paper proposes a block diagonalization (BD) as a precoding technique for minimizing interference among CSC users. The performance of the BD precoding implemented on the clustering network under various numbers of small-cells. The CSC also implements a water-filling power allocation (PA-CoopWF) to distribute the available transmission power along with the CSCs antennas. To show the performance, our paper simulates two types of precoding techniques; those are the proposed BD and minimum mean square error (MMSE) in CSCs. Based on the receiver user parts under the overlapping coordination of CSCs, our method based on the BD precoding achieves considerably higher data-rate transmission compared to the MMSE precoding, especially on larger clusters. The simulation also shows that by implementing CSC with the BD in short-range distances and higher numbers of antennas, it promotes better data-rate performances compared to the MMSE precoding by 2.75 times at distance 100m and 67% at 50 antennas.
BER Performance of MU-MIMO System using Dirty Paper CodingIJEEE
In this paper Dirty Paper Coding for communication system is implemented. MIMO application that involves devices such as cell phones, pocket PCs require closely spaced antenna, which suffers from mutual coupling among antennas and high spatial correlation for signals. DPC is used for compensating the degradation due to correlation and mutual coupling.
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationMangaiK4
Abstract - High speed low power viterbi decoders for trellis code modulation is well known for the delay consumption in underwater communication. In transmission system wireless communication is the transfer of information between two or more points that are not connected by an electrical conductor. WiMAX is the wireless communication standard designed to provide 30 to 40 Mega bits per second data rates. WiMAX as a standards based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL. WiMAX can provide at home or mobile internet access across whole cities or countries. The address generation of WiMAX is carried out by interleaver and deinterleaver. Interleaving is used to overcome correlated channel noise such as burst error or fading. The interleaver/deinterleaver rearranges input data such that consecutive data are spaced apart. The interleaved memory is to improve the speed of access to memory. The viterbi technique reduces the bit error rate and delay using wimax.
High Speed Low-Power Viterbi Decoder Using Trellis Code ModulationMangaiK4
Abstract - High speed low power viterbi decoders for trellis code modulation is well known for the delay consumption in underwater communication. In transmission system wireless communication is the transfer of information between two or more points that are not connected by an electrical conductor. WiMAX is the wireless communication standard designed to provide 30 to 40 Mega bits per second data rates. WiMAX as a standards based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL. WiMAX can provide at home or mobile internet access across whole cities or countries. The address generation of WiMAX is carried out by interleaver and deinterleaver. Interleaving is used to overcome correlated channel noise such as burst error or fading. The interleaver/deinterleaver rearranges input data such that consecutive data are spaced apart. The interleaved memory is to improve the speed of access to memory. The viterbi technique reduces the bit error rate and delay using wimax.
Similar to Application of diversity techniques for multi user idma communication system (20)
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Leading Change strategies and insights for effective change management pdf 1.pdf
Application of diversity techniques for multi user idma communication system
1. Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.2, 2013-National Conference on Emerging Trends in Electrical, Instrumentation & Communication Engineering
26
Application of Diversity Techniques for Multi User IDMA
Communication System
Aasheesh Shukla,Rajat Sapra,Vishal Goyal
Department of Electronics & Communication Engineering, GLA University, Mathura, India
E-mail: aasheeshshukla@gmail.com , sapra.glaitm@gmail.com
.M. Shukla
Department of Electronics & Communication Engineering, Harcourt Butler Technological Institute, Kanpur,
India
E-mail: manojs@hbti.ac.in
Abstract
In wireless communication, fading problem is mitigated with help of diversity techniques. This paper presents
Maximal Ratio Combining (MRC) diversity approach to uproot the fading problem in interleave-division
multiple-access (IDMA) scheme. The approach explains receiver diversity as well as transmits diversity analysis
as 1:2 and 2:1 antenna system in fading environment, no. of antennas can be increased to improve diversity order.
Random interleaver as well tree based interleaver has been taken for study. Significant improvements in
performance of IDMA communication is observed with application of diversity techniques.
Keywords: Random Interleaver, Tree Based Interleaver, MRC diversity, IDMA
1. Introduction
The goal for the next generation mobile communications system is to seamlessly provide a wide variety of
communication services to anybody, anywhere, anytime such as high voice quality, higher data rates etc. The
technology needed to tackle the challenges to make these services available is popularly known as the Third
Generation (3G) Cellular Systems using multiuser detection [1]. The fundamental phenomenon which makes
reliable communication difficult is time varying multipath fading, which is major impairment in any wireless
communication system. The performance improvement is very difficult in such situation
Theoretically, improvement in signal to noise ratio may be achieved by providing higher transmit power or
additional bandwidth which are not feasible solution as they are contrary to the requirements of next generation
wireless communication [2]. On the other hand, the problem of fading may be handled with suitable diversity
technique without expanding communication resources easily.
In most wireless channels, antenna diversity is a practical, effective and widely used technique for reducing the
effect of multipath fading. The maximal ratio combining (MRC) diversity technique, is implemented with
interleave-division multiple-access (IDMA) scheme, as MRC is performed well in comparison with selection or
equal gain combining.[3]-[5]. The IDMA scheme is known as advanced version of CDMA, which inherits many
advantages from CDMA such as dynamic channel sharing, mitigation of cross-cell interferences, asynchronous
transmission, ease of cell planning, and robustness against fading. It also allows a low complexity multiple user
detection (MUD) techniques [7] (CBC detection) applicable to systems with large numbers of users in multi-path
channels.
The objective of this paper is to use MRC diversity in IDMA communication system to reduce the effect of
fading. The study of transmit as well as receiver diversity is taken separately, because both have their own
application area [2]. The paper is organized as follows. Concept of IDMA is introduced in section 2. Section 3
deals with classical MRRC diversity approach used with IDMA. In section 4 transmit diversity is discussed with
IDMA. Performance analysis is provided in section 5. Finally conclusions are presented in section 6.
2. IDMA Scheme
2.1 IDMA Mechanism
The performance of conventional code-division multiple-access (CDMA) systems [1] is mainly limited by
multiple access interference (MAI), as well as intersymbol interference (ISI). Also, the complexity of CDMA
multi-user detection has always been a serious problem for researchers all over the world. The problem can be
visualized from the angle of computational cost as well complexity of multi-user detection algorithms in CDMA
systems. The use of user-specific signature sequences is a characteristic feature for a conventional CDMA
system. The possibility of employing interleaving for user separation in CDMA systems is briefly inducted in [1]
but the receiver complexity is considered as a main problem. In interleave-division multiple-access (IDMA)
scheme, users are distinguished by user specific chip-level interleavers instead of signatures as in a conventional
CDMA system. The scheme considered is a special case of CDMA in which bandwidth expansion is entirely
performed by low-rate coding. This scheme allows a low complexity multiple user detection techniques
2. Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.2, 2013-National Conference on Emerging Trends in Electrical, Instrumentation & Communication Engineering
27
applicable to systems with large numbers of users in multipath channels in addition to other advantages.
In CDMA scheme, signature sequences are used for user separation while in IDMA scheme, every user is
separated with user-specific interleavers, which are orthogonal in nature. The block diagram of IDMA scheme is
shown in figure 1 for K users. The principle of iterative multi user detection (MUD) which is a promising
technique for multiple access problems (MAI) is also illustrated in the lower part of Fig. 1. The turbo processor
involves elementary signal estimator block (ESEB) and a bank of K decoders (SDECs). The ESEB partially
resolves MAI without considering FEC coding. The outputs of the ESEB are then passed to the SDECs for
further refinement using the FEC coding constraint through de-interleaving block. The SDECs outputs are fed
back to the ESEB to improve its estimates in the next iteration with proper user specific interleaving. This
iterative procedure is repeated a preset number of times (or terminated if a certain stopping criterion is fulfilled).
After the final iteration, the SDECs produce hard decisions on the information bits [8]-[11].
The complexity involved (mainly for solving a size KxK correlation matrix) is O (K2
) per user by the well-
known iterative minimum mean square error (MMSE) technique in CDMA, while in IDMA, it is independent of
user. This can be a major benefit when K is large [12].
2.1 Scheme Model
Here, we consider an IDMA system [1], shown in Figure 1, with K simultaneous users using a single path
channel. At the transmitter, a N-length input data sequence d k = [d k (1), ………, d k (i) , … d k (N)]T
of user k is
encoded into chips ck= [c k (1), ………, c k (j) , … c k (J) ]T
based on low rate code C, where J is the Chip length.
The chips c k is interleaved by a chip level interleaver ‘Πk ’, producing a transmitted chip sequence x k = [x k
(1), … x k (j) , … x k (J) ]T
. After transmitting through the channel, the bits are seen at the receiver side as r = [r k
(1), ……,r k (j) , … r k (J) ]T
. The Channel opted is additive white Gaussian noise (AWGN) channel, for
simulation purpose.
In receiver section, after chip matched filtering, the received signal form the K users can be written as
1
( ) ( ) ( ), 1, 2,....... .
K
k k
k
r j h x j n j j J
=
= + =∑ (1)
Where h k is the channel coefficient for
th
k user and { ( )n j } are the samples of an additive white Gaussian
noise (AWGN) process with mean as zero and variance σ 2 =
N0 / 2. An assumption is made that {h k} are known
priori at the receiver.
The receiver consists of an elementary signal estimator block (ESEB) and a bank of K single user a posteriori
probability (APP) decoders (SDECs), operating in an iterative manner. The modulation technique used for
simulation is binary phase shift keying (BPSK) signaling. The outputs of the ESEB and SDECs are extrinsic log-
likelihood ratios (LLRs) about {x k} defined as
( / ( ) 1)
( ( )) log , , .
( / ( ) 1)
k
k
k
p y x j
e x j k j
p y x j
= +
= ∀
= −
(2)
Figure 1. Transmitter and Receiver structures of IDMA scheme with K simultaneous users.
These LLRs are further distinguished by the subscripts i.e., ( ( ))ESEB ke x j and ( ( ))SDEC ke x j , depending upon
whether they are generated by ESEB or SDECs.
Due to the use random interleavers {Π k}, the ESEB operation can be carried out in a chip-by-chip manner, with
only one sample r(j) used at a time. So, rewriting (2) as
3. Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.2, 2013-National Conference on Emerging Trends in Electrical, Instrumentation & Communication Engineering
28
( ) ( ) ( )k k kr j h x j jζ= + (3)
where
' '
'
( ) ( ) ( ) ( ) ( )k k k k k
k k
j r j h x j h x j n jζ
≠
= − = +∑ (4)
is the distortion in r( j) with respect to user-k. ( )k jξ is the distortion (including interference-plus-noise) in
received signal with respect to user-k.
A brief description of CBC algorithm [1] used in IDMA, has been presented in [3]. The operations of ESEB and
APP decoding are carried out user-by-user.
The outputs of the ESEB as extrinsic log-likelihood ratios (LLRs) is given as,
The LLR output of SDEC is given as,
Now, these steps are repeated depending on no. of iterations and users.
3. RECIEVER DIVERSITY ANALYSIS FOR IDMA
The block diagram of maximal ratio combining (MRC) diversity with IDMA scheme is shown in figure 2. In this
method, the diversity branches are weighted for maximum SNR. As shown in block diagram in figure 2, kd is
data of kth user, after encoding and spreading the data is randomly interleaved and termed as ‘chips’. Now this
chip Signal kx is sent from the transmit antenna, which will propagate from both the channel.
If we consider 1 transmit and 2 receive antenna, then channel between transmit antenna and the first received
antenna is h0 and between the transmit antenna and second receive antenna one is denoted by h1. The channel can
be modeled having magnitude and phase response. So,
h0 = α 0
0i
eθ
h1 =α 1
1i
eθ
(5)
Noise can be added at both the receiver. The resulting received signals are
R0 = h0xk + n0
R1 = h1xk + n1 (6)
Where, n0 and n1 represents the noise and interference at both the receiver separately.
Now the Receiver combining scheme for two branches MRRC can be written as
Χ K=h0
∗
R0 + h1
∗
R1 (7)
Now this output of maximal ratio combiner can fed to the detector for the proper estimation of transmitted signal
xk.
Figure 2. IDMA with proposed two branches MRRC diversity scheme for kth
user
2
( ) ( ( )) ( ( ))
( ( )) 2 .
( ) ( ( ))
k k
ESEB k k
j k k
r j E r j h E x j
e x j h
Var r h Var x j
− +
=
−
1
( ( ( ))) ( ( ( )))
S
SDEC k ESEB k
j
e x j e x jπ π
=
= ∑ 1,...,j S=
4. Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.2, 2013-National Conference on Emerging Trends in Electrical, Instrumentation & Communication Engineering
29
4. TRANSMIT DIVERSITY ANALYSIS FOR IDMA
In this section transmit diversity is discussed with IDMA communication system; figure 3 is showing the
arrangements for kth user. After encoding and spreading the data is interleaved then sent by two transmit antenna.
If two transmit antenna and one receive antenna system is used, then channel between first transmit antenna (t0)
and receiver antenna is h0 and between second transmit antenna (t1) is h1. So, the channel can be modeled like:
= ( )
= ( ) (8)
At a given symbol period two signals are simultaneously transmitted from two antennas. The signal transmitted
from antenna zero is S0 and antenna one is S1. During next symbol period conjugate of (-S1) is transmitted from
antenna zero and conjugate signal S0 is transmitted from antenna one, i.e. transmitted symbols are space time
encoded. Now the received signal can be written as
= ( ) = ℎ + ℎ +
= ( + ) = −ℎ ∗
+ ℎ ∗
+ (9)
These two signals will be received by the same antenna after a delay of T (Symbol period).
0 = ℎ∗
+ ℎ ∗
1 = ℎ∗
− ℎ ∗
(10)
Solving equations (8), (9) and (10), we can write
0 = ( + ) + ℎ∗
+ ℎ ∗
1 = ( + ) + ℎ ∗
+ ℎ∗
(11)
Now finally these two signals fed in to the CBC detection based IDMA detector.
Figure 3. IDMA with proposed transmit diversity scheme for kth
user
5. PERFORMANCE ANALYSIS
For simplicity, IDMA system with BPSK signaling is assumed with uniform repetitive coding and spread length
16, for all users along with 15 iterations.
The interleavers used in simulations are random interleaver (RI) [3] and tree based interleaver (TBI) [15].
5. Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.2, 2013-National Conference on Emerging Trends in Electrical, Instrumentation & Communication Engineering
30
Figure 4. Memory requirement comparison of Random Interleaver and Tree Based Interleaver.
Figure 4 demonstrates the memory requirement of RI and TBI. The memory requirement of RI is dependent on
user count [3] [4] while that of TBI is constant [15] due to use of only two master interleaving sequences for
generating the other user specific interleaving sequences. The memory required by Tree Based Interleaver
generation method is extremely less than that required for random interleaver generation method [3] and is
independent of user count.
In this section, we present simulation results to demonstrate the performance of the MRC diversity scheme with
IDMA systems. Here we refer the channel as slow fading Rayleigh channel. The interleavers used in simulations
are random interleaver [3] and tree based interleaver [15]. The block length is 200 and frame length is 65536
bits/frame with spread length to be 16. The iterations selected for simulation in receiver is 15. The simulations
have been performed for one transmitter and two receiver arrangement in the case of receiver diversity. On the
other hand, in the case of transmit diversity two transmitter antennas and one receiver antenna is used for
analysis. It is also assumed that transmit power from two antenna in transmit diversity is same as the power
transmit by single antenna in receiver diversity.
Figure 5 demonstrates the performance of IDMA scheme with using random interleaver. Here in receiver as well
as in transmit diversity two branches maximal ratio combining scheme is used for implementation of space
diversity technique. In this case, the degree of complexity remains similar to that in simple IDMA systems. The
BER performance with maximal ratio combining diversity is better than without using any diversity technique in
fading environment.
Figure 5. Performance of RI-IDMA with transmit and receive diversity
Figure 6 shows the BER performance of IDMA scheme using tree based interleaver with both diversity schemes.
From this figure we can see that the performance of IDMA system with MRC diversity is far better than that
without diversity also the performance of Tree based interleaver comes out to better in the case of transmit
diversity.
0 10 20 30 40 50 60 70 80 90 100
0
0.5
1
1.5
2
2.5
3
3.5
4
4.5
5
x 10
6
User Number
MemoryRequirementofInterleaver
With Random Interleaver
With Tree Based Interleaver
2 4 6 8 10 12 14 16 18
10
-6
10
-5
10
-4
10
-3
10
-2
10
-1
Eb/No
BitErrorRate
IDMA without diversity
IDMA with receiver diversity
IDMA with transmit diversity
k65536
k=65536
6. Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.2, 2013-National Conference on Emerging Trends in Electrical, Instrumentation & Communication Engineering
31
Figure 6. Performance of TBI-IDMA IDMA with transmit and receive diversity
6. CONCLUSIONS
We have employed diversity scheme for reducing the fading problem in IDMA systems. The results have taken
for transmit as well as receive diversity configuration. Simulation results show that IDMA scheme performs
better with both type of diversity schemes. Although it is not the intention to compare transmitter diversity to
receiver diversity, because it is already stated that both the diversity schemes performs nearly [2], but having
distinguish application area.
It is already explained that tree based interleaver performs good, near to random interleaver [13],but in the
reference of complexity and memory requirement it takes edge on random interleaver [figure 4]. So, both the
interleavers are taken for study and simulations show good BER performance.
IDMA with suitable diversity technique can generate fruitful results in the area of wireless communication. Since
IDMA inherits all the merits of DS-CDMA in addition to its own advantages, existing CDMA systems may be
enhanced by IDMA systems and study can also enhanced to Multiple input and multiple output (MIMO) antenna
system to improve the diversity order and hence the performance of IDMA communication system.
References
M. Moher and P. Guinand, “An iterative algorithm for asynchronous coded multi-user detection,” IEEE
Commun. Lett., vol. 2, pp. 229–231, Aug. 1998.
S.M.Alamouti. “A Simple transmitter diversity scheme for wireless communications” IEEE J. Select. Areas
Commun., vol.16 , pp. 1451-1458, Oct.1998.
Li ping, Lihai Liu, Keying Wu and W. K. Leung, “Interleave-Division Multiple-Access,” IEEE Trans. Wireless
Commun., vol. 5, pp. 938-947, April 2006.
H. Wu, L. Ping and A. Perotti, “User-specific chip-level interleaver design for IDMA systems,” IEEE Elec. Lett.,
vol. 42, no. 4, Feb. 2006.
Li Ping and L. Liu, “Analysis and design of IDMA systems based on SNR evolution and power allocation,” in
Proc. VTC’2004-Fall, Los Angles, CA, Sept. 2004
S. Brück, U. Sorger, S. Gligorevic, and N. Stolte, “Interleaving for outer convolutional codes in DS-CDMA
Systems,” IEEE Trans. Commun., vol. 48, pp. 1100–1107, July 2000.
Tarable, G. Montorsi, and S. Benedetto, “Analysis and design of interleavers for CDMA systems,” IEEE
Commun. Lett., vol. 5, pp. 420–422, Oct. 2001.
F. N. Brannstrom, T. M. Aulin, and L. K. Rasmussen, “Iterative multi-user detection of trellis code multiple
access using a posteriori probabilities,” in Proc. ICC 2001, Finland, June 2001, pp. 11–15.
S. Verdú and S. Shamai, “Spectral efficiency of CDMA with random spreading,” IEEE Trans. Inform. Theory,
vol. 45, pp. 622–640, Mar. 1999.
L. Liu, W. K. Leung, and Li Ping, “Simple chip-by-chip multi-user detection for CDMA systems,” in Proc.
IEEE VTC-Spring, Korea, Apr. 2003, pp. 2157-2161.
Li Ping, L. Liu, K. Y. Wu, and W. K. Leung, “A unified approach to multi-user detection and space time coding
with low complexity and nearly optimal performance,” in Proc. 40th Allerton Conference, Allerton House, USA,
Oct. 2002, pp. 170–179.
L. Liu, W. K. Leung, and Li Ping, “Simple iterative chip-by-chip multiuser detection for CDMA systems,” in
Proc. IEEE VTC 2003, Korea, Apr. 2003.
0 2 4 6 8 10 12 14 16 18
10
-6
10
-5
10
-4
10
-3
10
-2
10
-1
Eb/No
BitErrorRate
IDMA without diversity
IDMA with recieve diversity using TBI
IDMA with transmit diversity using TBI
k=65536
k=65536
7. Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol.3, No.2, 2013-National Conference on Emerging Trends in Electrical, Instrumentation & Communication Engineering
32
M. Shukla, V.K. Srivastava, S. Tiwari, “Analysis and Design of Optimum Interleaver for Iterative Receivers in
IDMA Scheme”, Wiley Journal of Wireless Communication and Mobile Computing, Vol 9. Issue 10, pp. 1312-
1317. Oct, 2009.
M. Shukla, Aasheesh Shukla,V.K. Srivastava, S. Tiwari, “Performance evaluation of MRC diversity scheme for
iterative IDMA receiver”,in proc. INDICON 2009, India, Dec. 2009.