This document compares the bit error rate (BER) performance of different digital modulation schemes (BPSK, QPSK, 16-QAM) over AWGN and Rayleigh fading channels using Simulink simulations. It finds that BPSK outperforms QPSK and 16-QAM in both channels. The BER is evaluated for these modulation schemes using two equalization techniques: constant modulus algorithm (CMA) and maximum likelihood sequence estimation (MLSE). According to the results, BPSK has better BER performance than QPSK and 16-QAM when using either equalizer, especially at lower SNR values. CMA equalization works better than MLSE equalization for all modulation schemes based on the BER values obtained.
Kinds of Propagation Models
Models of Different Types of Cells
Web Plot Digitizer Tool
Study of the parameters fc, d, hb, hm and Coverage Environments for each of OKUMURA, HATA and COST231
MATLAB Simulation
Hello everyone. This is a short presentation on path loss and shadowing. I have not covered all the topics but a brief idea is given on path loss and wireless channel propagation models.
Hope you find it useful.
Thanks
Kinds of Propagation Models
Models of Different Types of Cells
Web Plot Digitizer Tool
Study of the parameters fc, d, hb, hm and Coverage Environments for each of OKUMURA, HATA and COST231
MATLAB Simulation
Hello everyone. This is a short presentation on path loss and shadowing. I have not covered all the topics but a brief idea is given on path loss and wireless channel propagation models.
Hope you find it useful.
Thanks
Link Adaptation for Microwave Link using both MATLAB and Path-Loss Toolijeei-iaes
The inherent multipath transmission on wireless channels usually leads to signal fading which eventually degrades the system performance. In mitigating this problem, link adaptation has been identified as a promising scheme that helps in maximizing the system spectral efficiency (SE) in dispersive wireless channels. In this paper, link adaptation based on adaptive modulation and coding was used to study the performance of M-ary quadrature amplitude modulation radio system subjected to multipath fading. MATLAB® scripts and Simulink model were developed to compare the effect of wireless channel on different constellation sizes. Also, transmission link on Federal University of Technology Akure campus’ path terrain was designed with the aid of path-loss® tool application software in order to further analysis the effect of using different modulation formats on the system performance. The results show that, employment of link adaptation scheme offers better performance regarding the system availability and SE
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...ijistjournal
Spread-spectrum communication, with its inherent interference attenuation capability, has over the years become an increasingly popular technique for use in many different systems. They have very beneficial and tempting features, like Antijam, Security, and Multiple accesses. This thesis basically deals with the pseudo codes used in spread spectrum communication system. The cross-correlation and auto-correlation properties of the long Barker Code are analyzed. It has been seen that the length of the code, autocorrelation and cross-correlation properties can help us to determine the best suitable code for any particular communication environment. We have tried to find out the code with suitable auto-correlation properties along with low cross-correlation values. Barker code has good auto-correlation properties and we have found the pairs with the low cross- correlation so that they can be used in multi-user environment.
Link Adaptation for Microwave Link using both MATLAB and Path-Loss Toolijeei-iaes
The inherent multipath transmission on wireless channels usually leads to signal fading which eventually degrades the system performance. In mitigating this problem, link adaptation has been identified as a promising scheme that helps in maximizing the system spectral efficiency (SE) in dispersive wireless channels. In this paper, link adaptation based on adaptive modulation and coding was used to study the performance of M-ary quadrature amplitude modulation radio system subjected to multipath fading. MATLAB® scripts and Simulink model were developed to compare the effect of wireless channel on different constellation sizes. Also, transmission link on Federal University of Technology Akure campus’ path terrain was designed with the aid of path-loss® tool application software in order to further analysis the effect of using different modulation formats on the system performance. The results show that, employment of link adaptation scheme offers better performance regarding the system availability and SE
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...ijistjournal
Spread-spectrum communication, with its inherent interference attenuation capability, has over the years become an increasingly popular technique for use in many different systems. They have very beneficial and tempting features, like Antijam, Security, and Multiple accesses. This thesis basically deals with the pseudo codes used in spread spectrum communication system. The cross-correlation and auto-correlation properties of the long Barker Code are analyzed. It has been seen that the length of the code, autocorrelation and cross-correlation properties can help us to determine the best suitable code for any particular communication environment. We have tried to find out the code with suitable auto-correlation properties along with low cross-correlation values. Barker code has good auto-correlation properties and we have found the pairs with the low cross- correlation so that they can be used in multi-user environment.
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...ijistjournal
Spread-spectrum communication, with its inherent interference attenuation capability, has over the years become an increasingly popular technique for use in many different systems. They have very beneficial and tempting features, like Antijam, Security, and Multiple accesses. This thesis basically deals with the pseudo codes used in spread spectrum communication system. The cross-correlation and auto-correlation properties of the long Barker Code are analyzed. It has been seen that the length of the code, autocorrelation and cross-correlation properties can help us to determine the best suitable code for any particular communication environment. We have tried to find out the code with suitable auto-correlation properties along with low cross-correlation values. Barker code has good auto-correlation properties and we have found the pairs with the low cross- correlation so that they can be used in multi-user environment.
Investigation and Analysis of SNR Estimation in OFDM systemIOSR Journals
Estimation of signal to noise ratio (SNR) of received signal and to transmit the signal effectively for
the modern communication system. The performance of existing non-data-aided (NDA) SNR estimation methods
are substantially degraded for high level modulation scheme such as M-ary amplitude and phase shift keying
(APSK) or quadrature amplitude modulation (QAM).In this paper SNR estimation proposed method which uses
zero point auto-correlation of received signal per block and auto/cross- correlation of decision feedback signal
in orthogonal frequency division multiplexing (OFDM) system. Proposed method can be studied into two types;
Type 1 can estimate SNR by zero point auto-correlation of decision feedback signal based on the second
moment property. Type 2 uses both zero point auto-correlation and cross-correlation based on the fourth
moment property. In block-by-block reception of OFDM system, these two SNR estimation methods can be
possible for the practical implementation due to correlation based the estimation method and they show more
stable estimation performance than the earlier SNR estimation methods.
Performance analysis of image transmission with various channel conditions/mo...TELKOMNIKA JOURNAL
This paper investigates the impact of different modulation techniques for
digital communication systems that employ quadrature phase shift keying
(QPSK) and quadrature amplitude modulation (16-QAM and 64-QAM) to
transmit images over AWGN and Rayleigh fading channels for the cellular
mobile networks. In the further steps, wiener and median filters has been
adopted to the simulation are used at the receiver side to remove the impulsive
noise present in the received image. This work is performed to evaluate
the transmission of two dimensional (2D) gray-scale and color-scale (RGB)
images with different values from signal to noise ratios (SNR), such as;
(5, 10 and 15) dB over different channels. The correct conclusions are made
by comparing many of the observed Matlab simulation results. This was
carried out through the results that measure the quality of received image,
which is analyzes in terms of SNRimage peak signal to noise ratio (PSNR) and
mean square error (MSE).
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...ijwmn
In this paper, we proposed a novel efficient method of analyzing the ergodic channel capacity of the
cooperative amplify-and-forward (CAF) relay system. This is accomplished by employing a very tight
approximate moment generating function (MGF) of end-to-end signal-to-noise ratio of 2-hop multi-relay
system, which is In this paper, we proposed a novel efficient method of analyzing the ergodic channel
capacity of the cooperative amplify-and-forward (CAF) relay system. This is accomplished by employing a
very tight approximate moment applicable to myriad of fading environments including mixed and
composite fading channels. Three distinct adaptive source transmission policies were considered in our
analysis namely: (i) constant power with optimal rate adaptation (ORA); (ii) optimal joint power and rate
adaptation (OPRA); and (iii) fixed rate with truncated channel inversion (TCIFR). The proposed frame
work based on the novel approximate MGF method is sufficiently general to encapsulate all types of fading
environments (especially for the analysis of the mixed fading case)and provides significant advantage to
model wireless system for mixed and composite fading channel. In addition to simplifying computation
complexity of ergodic capacity for CAF relaying schemes treated in literature, we also derive closed form
expressions for the above three adaptive source transmission policies under Nakagami-m fading with i.n.d
statistics. The accuracy of our proposed method has been validated with existing MGF expressions that are
readily available for specific fading environments in terms of bounds, and via Monte Carlo simulations.
EFFICIENT ANALYSIS OF THE ERGODIC CAPACITY OF COOPERATIVE NON-REGENERATIVE RE...ijwmn
In this paper, we proposed a novel efficient method of analyzing the ergodic channel capacity of the
cooperative amplify-and-forward (CAF) relay system. This is accomplished by employing a very tight
approximate moment generating function (MGF) of end-to-end signal-to-noise ratio of 2-hop multi-relay
system, which is In this paper, we proposed a novel efficient method of analyzing the ergodic channel
capacity of the cooperative amplify-and-forward (CAF) relay system. This is accomplished by employing a
very tight approximate moment applicable to myriad of fading environments including mixed and
composite fading channels. Three distinct adaptive source transmission policies were considered in our
analysis namely: (i) constant power with optimal rate adaptation (ORA); (ii) optimal joint power and rate
adaptation (OPRA); and (iii) fixed rate with truncated channel inversion (TCIFR). The proposed frame
work based on the novel approximate MGF method is sufficiently general to encapsulate all types of fading
environments (especially for the analysis of the mixed fading case)and provides significant advantage to
model wireless system for mixed and composite fading channel. In addition to simplifying computation
complexity of ergodic capacity for CAF relaying schemes treated in literature, we also derive closed form
expressions for the above three adaptive source transmission policies under Nakagami-m fading with i.n.d
statistics. The accuracy of our proposed method has been validated with existing MGF expressions that are
readily available for specific fading environments in terms of bounds, and via Monte Carlo simulations.
Performance enhancement of audio transmission based on LMMSE methodnooriasukmaningtyas
The research in wireless communication has developed rapidly for the last
decades as a result of raising the demand for efficient data transmission with
more security and accuracy. This paper proposed a system based on the
special multiplexing (SM) technique and linear minimum mean square error
(LMMSE) detection method with the assistance of the hamming code as well
as the interleaving techniques for a better enhanced performance of an audio
transmission. Moreover, the comparison was done between the two systems
for different antenna configurations and with the presence of two types of
modulation: binary phase shift key and quateradure phase shift key. These
systems are employed by Matlab simulation to show significant results in
terms of enhancing the Rayleigh fading channel capacity, bit error rate
(BER) and security as well as in recovering the transmitting audio signals.
Each system has advantages than the others in one performance term respect
to the other terms. The simulation results have provided to prove and discuss
our analysis.
TECHNIQUES IN PERFORMANCE IMPROVEMENT OF MOBILE WIRELESS COMMUNICATION SYSTEM...Onyebuchi nosiri
Mobile wireless communication providers are expected by their numerous subscribers to provide network that can allow higher data rates, and good voice quality. However, this may be restricted due to some technical problems such as limited availability of radio frequency spectrum, bandwidth, channel capacity, geographical areas and transmission problems caused by various factors like fading and multipath distortion. All these lead to overall system performance degradation. This has led to various studies on how improvement on the performance of wireless communication can be realized using different techniques. This paper is a review of some scholarly works on this subject. To achieve this some recent scholarly articles were accessed online and their findings were highlighted. It was observed that all the articles reviewed had results drawn only from theoretical analysis. Based on this, one of the recommendations is that theoretical analysis should be supported with data obtained from carrying out RF measurements in the field where possible.
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A CONCEPTUAL FRAMEWORK OF A DETECTIVE MODEL FOR SOCIAL BOT CLASSIFICATIONijasa
Social media platform has greatly enhanced human interactive activities in the virtual community. Virtual
socialization has positively influenced social bonding among social media users irrespective of one’s
location in the connected global village. Human user and social bot user are the two types of social media
users. While human users personally operate their social media accounts, social bot users are developed
software that manages a social media account for the human user called the botmaster. This botmaster in
most cases are hackers with bad intention of attacking social media users through various attacking mode
using social bots. The aim of this research work is to design an intelligent framework that will prevent
attacks through social bots on social media network platforms.
DESIGN OF A MINIATURE RECTANGULAR PATCH ANTENNA FOR KU BAND APPLICATIONSijasa
A significant portion of communication devices employs microstrip antennas because of their compact size,
low profile, and ability to conform to both planar and non-planar surfaces. To achieve this, we present a
miniature inset-fed rectangular patch antenna using partial ground plane for Ku band applications. The
proposed antenna design used an operating frequency of 15.5 GHz, a FR4 substrate with a dielectric
constant of 4.3, and a thickness of 1.4 mm. It is fed by a 50 Ω inset feedline. Computer simulation
technology (CST) software is used to design, simulate, and analyze. The simulation yields the antenna
performance parameters, including return loss (S11), bandwidth, VSWR, gain, directivity, and radiation
efficiency. The simulation findings revealed that the proposed antenna resonated at 15.5 GHz, with a
return loss of -22.312 dB, a bandwidth of 2.73 GHz (2730 MHz), VSWR of 1.17, a gain of 3.843 dBi, a
directivity of 5.926 dBi, and an antenna efficiency of -2.083 dB (61.901%).
SMART SOUND SYSTEM APPLIED FOR THE EXTENSIVE CARE OF PEOPLE WITH HEARING IMPA...ijasa
We, as normal people, have access to a potent communication tool, which is sound. Although we can continuously gather, analyse, and interpret sounds thanks to our sense of hearing, it can be challenging for people with hearing impairment to perceive their surroundings through sound. Also known as PWHI (People with Hearing Impairment). Auditory/phonic impairment is one of the most prevailing sensory deficits in humans at present. Fortunately, there is room to apply a solution to this issue, given the development of technology. Our project involves capturing ambient sounds from the user’s surroundings and notifying the user through a mobile application using IoT and Deep Learning. Its architecture offers sound recognition using a tool, such as a microphone, to capture sounds from the user's surroundings. These sounds are identified and categorized as ambient sounds, like a doorbell, baby cry, and dog barking; as well as emergency-related sounds, such as alarms, sirens, et
AN INTELLIGENT AND DATA-DRIVEN MOBILE VOLUNTEER EVENT MANAGEMENT PLATFORM USI...ijasa
In Lewis and Clark High School’s Key Club, meetings are always held in a crowded classroom. The
system of event sign-up is inefficient and hinders members from joining events. This has led to students
becoming discouraged from joining Key Club and often resulted in a lack of volunteers for important
events. The club needed a more efficient way of connecting volunteers with volunteering opportunities. To
solve this problem, we developed a VolunteerMatch Mobile application using Dart and Flutter framework
for Key Club to use. The next steps will be to add a volunteer event recommendation and matching feature,
utilizing the results from the research on machine learning models and algorithms in this paper.
A STUDY OF IOT BASED REAL-TIME SOLAR POWER REMOTE MONITORING SYSTEMijasa
We have Developed an IoT-based real-time solar power monitoring system in this paper. It seeks an opensource IoT solution that can collect real-time data and continuously monitor the power output and environmental conditions of a photovoltaic panel.The Objective of this work is to continuously monitor the status of various parameters associated with solar systems through sensors without visiting manually, saving time and ensures efficient power output from PV panels while monitoring for faulty solar panels, weather conditionsand other such issues that affect solar effectiveness.Manually, the user must use a multimeter to determine what value of measurement of the system is appropriate for appliance consumers, which is difficult for the larger System. But the Solar Energy Monitoring system is designed to make it easier for users to use the solar system.This system is comprised of a microcontroller (Node MCU), a PV panel, sensors (INA219 Current Module, Digital Temperature Sensor, LDR), a Battery Charger Module, and a battery. The data from the PV panels and other appliances are sent to the cloud (Thingspeak) via the internet using IoT technology and a Wi-Fi module (NodeMCU). It also allows users in remote areas to monitor the parameters of the solar power plant using connected devices. The user can view the current, previous, and average parameters of the solar PV system, such as voltage, current, temperature, and light intensity using a Graphical User Interface. This will facilitate fault detection and maintenance of the solar power plant easier and saves time.
SENSOR BASED SMART IRRIGATION SYSTEM WITH MONITORING AND CONTROLLING USING IN...ijasa
This paper presents the development of a sensor based smart irrigation system with the capabilities of remote monitoring and controlling of water usage in the agriculture field using Internet of Things (IoT). With the employment of IoT in irrigation system, all agricultural information can be viewed and controlled at the user's fingertips. The system consists of a microcontroller (Node MCU), sensors (soil moisture, DHT11), and irrigation of a water pump with a decision-making system. Sensors are linked to a Wi-Fi module (Node MCU) and are interdependent to provide increased sensitivity to the irrigation system. The data obtained will be uploaded to the cloud (ThingSpeak) and presented in the form of graphs accessible via the website. A web page is used to control the water pump for irrigation purposes. This paper is managed to meet all of its aims to help farmers in terms of time, project cost, labor, water consumption, power consumption, and reliability by implementing the IoT-based smart irrigation system.
PERFORMANCE OF CONVOLUTION AND CRC CHANNEL ENCODED V-BLAST 4×4 MIMO MCCDMA WI...ijasa
Wireless communications are among the rapidly growing fields in our current life and have a massive effect on every aspect of our everyday life. In this paper, the performance of the various digital modulation techniques (BPSK, DPSK, QPSK, and QAM) based wireless communication system on the audio signal transmission through the additive Gaussian Noise (AWGN) channel is assessed on the basis of bit error rate (BER) as a function of the signal-to-noise ratio (SNR). Based on the results of this study, BPSK modulation outperforms the DPSK, QPSK, and QAM modulation strategies in the MIMO MC-CDMA VBlast based wireless communication system. The digital modulation of QPSK shows the worst performance in audio signal transmission especially in comparison to other digital modulations. It is clear from the current simulation study based on MATLAB that the V-Blast encoded 4×4 MIMO MC-CDMA wireless system with minimum mean square error (MMSE) signal detection and 1⁄2-rated convolution and cyclic redundancy check (CRC) channel encoding strategies show good performance utilizing BPSK digital modulation in audio signal transmission
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGijasa
Cloud computing is an anthology in which one or more computers are connected in a network. Cloud
computing is a cluster of lattice computing, autonomic computing and utility computing. Cloud provides an
on demand services to the users. Many numbers of users access the cloud to utilize the cloud resources.
The security is one the major problem in cloud computing. Hence security is a major issue in cloud
computing. Providing security is a major requirement of cloud computing. The study enclose all the
security issues and attack issues in cloud computing.
The International Journal of Ambient Systems and Applications (IJASA) ijasa
The International Journal of Ambient Systems and applications is a quarterly open access peer-reviewed journal that publishes articles which contribute new results in all areas of ambient Systems. The journal focuses on all technical and practical aspects of ambient Systems, networks, technologies and applications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced ambient Systems and establishing new collaborations in these areas.Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in ambient Systems.
A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTINGijasa
Cloud computing is an anthology in which one or more computers are connected in a network. Cloud computing is a cluster of lattice computing, autonomic computing and utility computing. Cloud provides an on demand services to the users. Many numbers of users access the cloud to utilize the cloud resources. The security is one the major problem in cloud computing. Hence security is a major issue in cloud computing. Providing security is a major requirement of cloud computing. The study enclose all the security issues and attack issues in cloud computing.
TOWARD ORGANIC COMPUTING APPROACH FOR CYBERNETIC RESPONSIVE ENVIRONMENTijasa
The developpment of the Internet of Things (IoT) concept revives Responsive Environments (RE) technologies. Nowadays, the idea of a permanent connection between physical and digital world is technologically possible. The capillar Internet relates to the Internet extension into daily appliances such as they become actors of Internet like any hu-man. The parallel development of Machine-to-Machine
communications and Arti cial Intelligence (AI) technics start a new area of cybernetic. This paper presents an approach for Cybernetic Organism (Cyborg) for RE based on Organic Computing (OC). In such approach, each appli-ance is a part of an autonomic system in order to control a physical environment.The underlying idea is that such systems must have self-x properties in order to adapt their behavior to
external disturbances with a high-degree of autonomy.
A STUDY ON DEVELOPING A SMART ENVIRONMENT IN AGRICULTURAL IRRIGATION TECHNIQUEijasa
Maintaining a good irrigation system is a necessity in today’s water scarcity environment. This paper describes a new approach for automated Smart Irrigation (SIR) system in agricultural management. Using
various types of sensors in the crop field area, temperature and moisture value of the soil is monitored.Based on the sensed data, SIR will automatically decide about the necessary action for irrigation and also notifies the user. The system will also focus on the reduction of energy consumption by the sensors during communication.
A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGYijasa
Denial of Service (DoS) or Distributed-Denial of Service (DDoS) is major threat to network security.
Network is collection of nodes that interconnect with each other for exchange the Information. This
information is required for that node is kept confidentially. Attacker in network computer captures this
information that is confidential and misuse the network. Hence security is one of the major issues. There
are one or many attacks in network. One of the major threats to internet service is DDoS (Distributed
denial of services) attack. DDoS attack is a malicious attempt to suspending or interrupting services to
target node. DDoS or DoS is an attempt to make network resource or the machine is unavailable to its
intended user. Many ideas are developed for avoiding the DDoS or DoS. DDoS happen in two ways
naturally or it may due to some botnets .Various schemes are developed defense against to this attack.
Main idea of this paper is present basis of DDoS attack. DDoS attack types, DDoS attack components,
survey on different mechanism to prevent DDoS
The smart mobile terminal operator platform Android is getting popular all over the world with its wide variety of applications and enormous use in numerous spheres of our daily life. Considering the fact of increasing demand of home security and automation, an Android based control system is presented in this paper where the proposed system can maintain the security of home main entrance and also the car door lock. Another important feature of the designed system is that it can control the overall appliances in a room. The mobile to security system or home automation system interface is established through Bluetooth. The hardware part is designed with the PIC microcontroller.
The World Wide Web is booming and radically vibrant due to the well established standards and widely accountable framework which guarantees the interoperability at various levels of the application and the society as a whole. So far, the web has been functioning at the random rate on the basis of the human intervention and some manual processing but the next generation web which the researchers called semantic web, edging for automatic processing and machine-level understanding. The well set notion, Semantic Web would be turn possible if only there exists the further levels of interoperability prevails among the applications and networks. In achieving this interoperability and greater functionality among the applications, the W3C standardization has already released the well defined standards such as RDF/RDF Schema and OWL. Using XML as a tool for semantic interoperability has not achieved anything effective and failed to bring the interconnection at the larger level. This leads to the further inclusion of inference layer at the top of the web architecture and its paves the way for proposing the common design for encoding the ontology representation languages in the data models such as RDF/RDFS. In this research article, we have given the clear implication of semantic web research roots and its ontological background process which may help to augment the sheer understanding of named entities in the web.
Wireless sensor networks provide ubiquitous computing systems in various open environments. In the
environment, sensor nodes can easily be compromised by adversaries to generate injecting false data
attacks. The injecting false data attack not only consumes unnecessary energy in en-route nodes, but also
causes false alarms at the base station. To detect this type of attack, a bandwidth-efficient cooperative
authentication (BECAN) scheme was proposed to achieve high filtering probability and high reliability
based on random graph characteristics and cooperative bit-compressed authentication techniques. This
scheme may waste energy resources in en-route nodes due to the fixed number of forwarding reports. In
this paper, our proposed method effectively selects a dynamic number of forwarding reports in the source
nodes based on an evaluation function. The experimental results indicate that our proposed method
enhances the energy savings while maintaining security levels as compared to BECAN.
Artificial neural networks (ANN) consider classification as one of the most dynamic research and
application areas. ANN is the branch of Artificial Intelligence (AI). The neural network was trained by
back propagation algorithm. The different combinations of functions and its effect while using ANN as a
classifier is studied and the correctness of these functions are analyzed for various kinds of datasets. The
back propagation neural network (BPNN) can be used as a highly successful tool for dataset classification
with suitable combination of training, learning and transfer functions. When the maximum likelihood
method was compared with backpropagation neural network method, the BPNN was more accurate than
maximum likelihood method. A high predictive ability with stable and well functioning BPNN is possible.
Multilayer feed-forward neural network algorithm is also used for classification. However BPNN proves to
be more effective than other classification algorithms.
Wireless sensor networks (WSNs) are regularly deployed in harsh and unattended environments, and
sensor nodes are easily exposed to attacks due to the random arrangement of the sensor field. An attacker
can inject fabricated reports from a compromised node with false votes and false vote-based reports. The
false report attacks can waste the energy of the intermediate nodes, shortening the network lifetime.
Furthermore, false votes cause the filtering out of legitimate reports. A probabilistic voting-based filtering
scheme (PVFS) was proposed as a countermeasure against this type of attacks by Li and Wu. PVFS uses a
vote threshold, a security threshold, and a verification node. The scheme does not make additional use
energy or communications resources because the verification node and threshold values are fixed. There
needs to be a verification node selection method that considers the energy resources of the node. In this
paper, we propose a verification path election scheme based on a fuzzy logic system. In the proposed
scheme, one node transmits reports in the node with a strong state through a fuzzy logic system after which
a neighbor is selected out of two from the surroundings. Experimental results show that the proposed
scheme improves energy savings up to maximum 13% relative to the PVFS.
In this paper a novel intelligent soft computing based cryptographic technique based on synchronization of
two chaotic systems (CSCT) between sender and receiver has been proposed to generate session key using
Pecora and Caroll (PC) method. Chaotic system has some unique features like sensitive to initial
conditions, topologically mixing; and dense periodic orbits. By nature, the Lorenz system is very sensitive
to initial conditions meaning that the error between attacker and receiver is going to grow exponentially if
there is a very slight difference between their initial conditions. All these features make chaotic system as
good alternatives for session key generation. In the proposed CSCT few parameters ( , b , r , x1 ,y2 and z2 )
are being exchanged between sender and receiver. Some of the parameter which takes major roles to form
the session key does not get transmitted via public channel, sender keeps these parameters secret. This way
of handling parameter passing mechanism prevents any kind of attacks during exchange of parameters like
sniffing, spoofing or phishing.
A black-hole attack in the Mobile Ad-hoc NETwork (MANET) is an attack occurs due to malicious nodes,
which attracts the data packets by falsely advertising a fresh route to the destination. In this paper, we
present a clustering approach in Ad-hoc On-demand Distance Vector (AODV) routing protocol for the
detection and prevention of black-hole attack in MANETs. In this approach every member of the cluster will
ping once to the cluster head, to detect the peculiar difference between the number of data packets received
and forwarded by the node. If anomalousness is perceived, all the nodes will obscure the malicious nodes
from the network.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
COMPARISON OF BIT ERROR RATE PERFORMANCE OF VARIOUS DIGITAL MODULATION SCHEMES OVER AWGN AND RAYLEIGH FADING CHANNELS USING SIMULINK
1. International Journal of Ambient Systems and Applications (IJASA) Vol.9, No.1/2, June 2021
DOI:10.5121/ijasa.2021.9202 7
COMPARISON OF BIT ERROR RATE
PERFORMANCE OF VARIOUS DIGITAL
MODULATION SCHEMES OVER AWGN AND
RAYLEIGH FADING CHANNELS USING SIMULINK
Md. Firoz Ahmed1
, Md. Faysal Ahmed1
and Abu Zafor Md. Touhidul Islam2
1
Department of Information and Communication Engineering,
Rajshahi University, Rajshahi-6205 Bangladesh
2
Department of Electrical and Electronic Engineering, Rajshahi University,
Rajshahi-6205 Bangladesh
ABSTRACT
Digital modulation increases information capacity, data security, and system availability while
maintaining high communication quality. As a result, digital modulation techniques are in higher demand
than analog modulation techniques due to their ability to transmit larger amounts of data. Amplitude Shift
Keying (ASK), Frequency Shift Keying (FSK), Phase Shift Keying (PSK), Differential Phase Shift Keying
(DPSK), and Quadrature Amplitude Modulation (QAM) are critical components of current
communications systems development, particularly for broadband wireless communications. In this paper,
the comparison of bit error rate performance of different modulation schemes (BPSK, QPSK, and16-QAM)
and various equalization techniques such as constant modulus algorithm (CMA) and maximum likelihood
sequence estimate (MLSE) for the AWGN and Rayleigh fading channels is analyzed using Simulink. BPSK
outperforms QPSK and 16-QAM when compared to the other two digital modulation schemes. Among the
three digital modulation schemes, BPSK is showing better performance as compared to QPSK and 16-
QAM.
KEYWORDS
AWGN Channel, Rayleigh Fading Channel, CMA, MLSE
1. INTRODUCTION
The performance of transmitting and receiving systems is critical in recent times for rapidly
growing wireless technologies. Digital modulation schemes help to advance mobile
communications by increasing wireless network capacity, speed, and quality [1]. The strategies of
digital modulation increase information-carrying capacity, communication quality, data security,
and RF spectrum sharing, allowing for more services. The choice of digital modulation scheme
will significantly affect the characteristics, performance, and resulting physical realization of a
communication system. There is no universal 'best' scheme, but some will be a better fit than
others depending on the physical characteristics of the channel, required levels of performance,
and target hardware trade-offs. The required data rate, acceptable latency, available bandwidth,
anticipated link budget, and target hardware cost, size, and current consumption must all be taken
into account [2].
The next-generation wireless communication systems require higher data transmission rates in
order to meet the higher demand for quality services [3]. A major transition from analog to digital
2. International Journal of Ambient Systems and Applications (IJASA) Vol.9, No.1/2, June 2021
8
communications has occurred in the last few decades, and it can be seen in all fields of
communication because a digital communication system is more reliable than an analog system.
Digital modulation methods are preferred over analog modulation schemes because they provide
greater immunity to noise at the expense of higher bandwidth requirements, whereas the
requirement of video, audio, and data over a computer network or a mobile telephony network,
referred to as third-generation mobile communication, poses a serious bandwidth problem, as a
result, existing modulation schemes must be modified for the purpose so that they can handle
both noise and bandwidth efficiency [4].
In comparison to analog transmission, digital transmission provides greater reliability in a noisy
environment. However, sometimes the digital information, i.e. the transmitted pulses, is smeared
out to the point where pulses corresponding to different symbols cannot be distinguished, a
phenomenon known as inter-symbol interference (ISI) [5]. The bit error rate (BER) versus signal-
to-noise ratio (SNR) curve can be used to assess the channel's performance. In digital
transmission, BER is defined as the percentage of bits with errors divided by the total number of
bits transmitted, received, or processed in a given time period. Typically, the rate is expressed as
10 to the negative power. Unwanted energy is represented by noise. When the signal is weak,
noise can interfere with it at any point in the communication system. The equalizer provides the
inverse of the channel to the received signal, resulting in flat frequency response and linear phase.
The static equalizer's noise performance is subpar. Most of the time, the transfer functions of the
transmission system are unknown. In addition, the impulse response of the channel may vary
over time. As a result, designing equalizers becomes difficult [6]. Because the channel has
amplitude and phase dispersion, the transmitted signals interfere with one another. As a result,
equalizers are created to address this issue. The equalizer is designed to work in such a way that
the Bit Error Rate (BER) is low and the Signal-to-Noise Ratio (SNR) is high [7].
In [8], the performance of digital modulation schemes–BPSK, QPSK, and QAM–with MATLAB
is investigated. They demonstrated that BPSK outperforms QPSK and QAM in both cases, using
AWGN and Rayleigh fading channels. In [9], the bit error rate performance characteristics of the
receiver are evaluated using a MATLAB Simulink model for BPSK, QPSK, BFSK, DBPSK, M-
PSK, M-FSK, and QAM modulation techniques. According to the study's findings, BPSK is the
most effective modulation scheme in a practical communication system. The Simulink model is
used to study and analyze the performance of stego image transmission in [10]. According to the
result of the study, the PSNR graphs show that the best modulation scheme having higher error
tolerance than others. A comparative analysis of various equalization techniques (LMS, RLS, and
CMA) in the OFDM System using different Digital Modulations are introduced in [11].
According to the Simulink results, the CMA equalizer in the OFDM-based BPSK system
produces the lowest BER value when compared to the LMS and RLS equalizers. In [12], the
performance comparison of non-linear and adaptive equalization algorithms for wireless digital
communication is presented. Adaptive algorithms like LMS and RLS are more preferable where
channel characteristics are unknown a priori and, in many cases, the channel response is time-
variant, according to studies.
The present study investigates the comparison of bit error rate performance of different digital
modulation techniques are used over the AWGN channel and on Rayleigh fading with the
implementation of CMA and MLSE equalizer schemes for 10000 bits transmission.
3. International Journal of Ambient Systems and Applications (IJASA) Vol.9, No.1/2, June 2021
9
2. EQUALIZERS
2.1. Constant Modulus Algorithm (CMA)
The constant modulus algorithm (CMA) is a shortened form for the algorithm of constant
modulus. To equalize a linearly modulated baseband signal passing through a dispersive channel,
the CMA Equalizer block employs a linear equalizer and the constant modulus algorithm (CMA).
The CMA is used by the block to update the weights once per symbol during simulation [13]. If
the parameter Number of samples per symbol is set to 1, the block will implement a symbol-
spaced equalizer; otherwise, the block will implement a fractionally spaced equalizer [13].
2.2. Maximum Likelihood Estimation
Equalizers based on Maximum-Likelihood Sequence Estimation (MLSE) provide optimal
equalization of time variations in propagation channel characteristics. MLSE equalizers, on the
other hand, are sometimes less appealing because their computational complexity is higher than
that of adaptive equalizers. The viterbi algorithm is used by the MLSE equalizer block to
equalize a linearly modulated signal passing through a dispersive channel. These characteristics
produce the maximum likelihood sequence estimate of the signal using a channel estimate
modeled as a finite input response (FIR) filter. An MLSE equalizer provides the best theoretical
performance but is computationally demanding. [14].
3. CHANNELS
The most important aspect of any communication system is the channel. The performance of a
communication channel is affected by noise. There are several types of communication channels.
3.1. AWGN (Additive White Gaussian Noise) Channel
Additive White Gaussian Noise is a fundamental noise model used in information theory to
simulate the effect of many random processes found in nature. Modifiers are words that describe
specific qualities.
The AWGN channel is a common channel model in which the only impediment to
communication is a linear addition of wideband or white noise with constant spectral density and
Gaussian amplitude distribution. Fading, frequency selection, interference, and dispersion are not
taken into account in the model. Before considering these phenomena, it generates simple and
tractable mathematical models that are useful for gaining insight into the underlying behavior of
the system. It is an appropriate model for many satellite and deep space communications links.
It's the most fundamental communication system model [15].
3.2. Fading Channel
The term "fading" refers to the rapid fluctuations in amplitude, phase, and multipath delays of a
radio signal over a short period of time or travel distance, allowing large-scale path loss effects to
be ignored. There are various types of fading channels depending on the circumstances; however,
we will focus on Rayleigh fading channels, in which the impulse response may follow
distributions of Rayleigh distributions (in which there is no Line of Sight (LOS) ray between
transmitter and receiver [15].
4. International Journal of Ambient Systems and Applications (IJASA) Vol.9, No.1/2, June 2021
10
4. PROPOSED MODEL
The proposed model of the communication system using various equalizers such as constant
modulus algorithm (CMA) and maximum likelihood sequence estimation (MLSE) for different
digital modulation schemes (BPSK, QPSK, and16-QAM ) shown below in Fig.1.
Figure 1. Proposed model of the communication system using various equalizers (CMA, MLSE) for
different digital modulation schemes
The proposed model is made up of a transmitter, a channel, and a receiver. The data in this
proposed work is generated using a random integer. Following that, the output is modulated using
the digital modulation technique (BPSK, QPSK and 16-QAM). Following modulation, the output
is routed through a multipath Rayleigh channel and an AWGN channel. The channel output is
independently routed through the CMA and MLSE equalizers. After that, the equalized output is
demodulated. The demodulated output is fed into an error rate calculator to determine the BER
value. For CMA and MLSE equalization, the BER value is computed. A BER comparison for
various digital modulation schemes is performed.
5. SIMULINK RESULTS AND ANALYSIS
Matlab based Simulink is used to simulate the proposed communication system model, which
employs CMA and MLSE equalization techniques. The simulation parameters are as follows:
Modulation - BPSK, QPSK and 16-QAM
Equalizer - CMA and MLSE
Fading channel - Multipath Rayleigh, AWGN
The BER results using the CMA equalizer and MLSE for the BPSK, QPSK, and 16-QAM
modulation is shown in Fig.2 to 7.
5. International Journal of Ambient Systems and Applications (IJASA) Vol.9, No.1/2, June 2021
11
Figure 2. BER Analysis of CMA Equalizer for BPSK modulation
Figure 3. BER Analysis of CMA Equalizer for QPSK modulation
Figure 4. BER Analysis of CMA Equalizer for 16-QAM modulation
6. International Journal of Ambient Systems and Applications (IJASA) Vol.9, No.1/2, June 2021
12
Figure 5. BER Analysis of MLSE Equalizer for BPSK modulation
Figure 6. BER Analysis of MLSE Equalizer for QPSK modulation
7. International Journal of Ambient Systems and Applications (IJASA) Vol.9, No.1/2, June 2021
13
Figure 7. BER Analysis of MLSE Equalizer for 16-QAM modulation
Figure 8. BER performance comparison of BPSK, QPSK and 16-QAM digital
modulation schemes using CMA equalizer
8. International Journal of Ambient Systems and Applications (IJASA) Vol.9, No.1/2, June 2021
14
Figure 9. BER performance comparison of BPSK, QPSK and 16-QAM digital
modulation schemes using MLSE equalizer
Fig. 8 represents a system performance comparison using a constant modulus algorithm (CMA)-
based equalizer scheme with various digital modulation methods (BPSK, QPSK, and 16-QAM).
As shown in Table 1, the BER values for BPSK, QPSK, and 16-QAM digital modulation
schemes are 0.4714, 0.7279, and 0.8772, respectively, in the general expected SNR value of 5
dB, implying that the system performance achieves a gain of 10.25 dB, 8.37 dB, and 7.56 dB
using BPSK, QPSK, and 16-QAM strategies, respectively, with the implementation of CMA
equalizer technique. When SNR is equal to 1 decibel, 16-QAM has a higher BER value than
other modulation schemes. Table 1 gives the BER values of the system using the CMA equalizer
method, as well as various digital modulation schemes (BPSK, QPSK, and 16-QAM) at various
SNR levels (1dB – 5dB). In terms of BER performance, the table clearly shows that for different
SNR values (SNR = 1dB - 5dB), BPSK outperforms QPSK and 16-QAM. The BER performance
of the system is compared in Fig. 9 using BPSK, QPSK, and 16-QAM digital modulation
schemes with an MLSE-based equalizer scheme. The bit error rate (BER) is much lower than the
signal-to-noise ratio (SNR). The performance of BPSK is clearly superior to that of the others, as
evidenced by this figure. QPSK, on the other hand, has a nearly smaller result, whereas 16-QAM
has a higher bit error rate (BER). When SNR=1 dB, 16-QAM has a higher BER value than other
modulation techniques. Table 1 show the BER values of the system with the MLSE equalizer
scheme and various digital modulation schemes (BPSK, QPSK, and 16-QAM) at different SNR
(1dB - 5dB). The table clearly shows that for different SNR values (SNR = 1dB - 5dB), BPSK
outperforms QPSK and 16-QAM in terms of BER performance.
According to the results of the preceding analysis, the system performs the worst in the MLSE-
based equalizer scheme when compared to the CMA equalizer technique in 10000 bits
transmission.
9. International Journal of Ambient Systems and Applications (IJASA) Vol.9, No.1/2, June 2021
15
Table 1. BER results of 10000 bits transmission of CMA and MLSE equalizer
for different digital modulation schemes.
6. CONCLUSION
In this paper, the comparison of bit error rate performance of different modulation schemes
(BPSK, QPSK, and 16-QAM) and various equalization techniques (CMA and MLSE) for the
AWGN and Rayleigh fading channels has been successfully analyzed using Simulink. A variety
of modulation schemes, including BPSK, QPSK, and 16-QAM, were considered for simulation
and their BER was evaluated using the MATLAB based Simulink simulation tool for Rayleigh
fading and the Additive White Gaussian Noise Stream. According to the Simulink results in the
preceding table, BPSK is the most efficient modulation scheme for CMA equalizer in a practical
communication system, as compared to MLSE equalizer, depending on the bit error rate (BER).
REFERENCES
[1] M. Barnela, “Digital Modulation Schemes Employed in Wireless Communication: A Literature
review,” International Journal of Wired and Wireless Communications, Vol.2 (2) (April, 2014).
[2] Geoff Smithson, “Introduction to Digital Modulation Schemes”, IEE Colloquium on The Design of
Digital Cellular Handsets, London, UK, page(s): 2.1-2.9 (1998).
[3] J.T. Haitham, and M.F.M Salleh, “Multi-carrier Transmission Techniques for Wireless
Communication Systems: A Survey, WSEAS Transactions on Communications,” ISSN: 1109-2742,
Vol.8 (5) (May 2009).
[4] R. Pandey, and K. Pandey, “An Introduction of Analog and Digital Modulation Techniques in
Communication System,” Journal of Innovative Trends in Science Pharmacy & Technology, Vol. 1
(2014).
[5] A.C.Gurve, S.S. Wasnik, A.Yerlekar, and N. Chide, “Study of OFDM Variants and Implementation
of OFDM Using fft/ifft,” International Journal of Advanced Research in Computer and
Communication Engineering, Vol. 3(7) (July 2014).
[6] B.W.Luo, X.Y. Zhang, and X.K. Ren, “On Applications of OFDM Technique,” Video Engineering.
Vol. 2, pp. 005, (2006).
CMA
Signal-to -
Noise
Ratio (SNR)
dB
Bit Error Rate (BER)
BPSK QPSK 16-QAM
1 0.5323 0.8115 0.9804
2 0.5000 0.8095 0.9340
3 0.4806 0.7984 0.9340
4 0.4762 0.7984 0.9091
5 0.4714 0.7279 0.8772
MLSE
1 0.5156 0.7174 0.9519
2 0.5000 0.7174 0.9515
3 0.4902 0.6972 0.9512
4 0.4854 0.6875 0.9444
5 0.4808 0.6875 0.9352
10. International Journal of Ambient Systems and Applications (IJASA) Vol.9, No.1/2, June 2021
16
[7] N.Marchetti, M.I.Rahman, S. Kumar, and R. Prasad, “OFDM: Principles and challenges. In New
directions in wireless communications research,” Springer, US. Pp.29 - 62, (2009).
[8] R. Prameela Devi, and H.Nishat,"Performance Evaluation of Digital Modulation Schemes BPSK,
QPSK & QAM, "International Journal of Engineering and Techniques, Vol.3 (2), (2017).
[9] M.G.Sadeque, "Bit Error Rate (BER) Comparison of AWGN Channels for Different Type’s Digital
Modulation Using MATLAB Simulink, "American Scientific Research Journal for Engineering,
Technology, and Sciences (ASRJETS) Vol.13(1), pp 61-71,(2015).
[10] R.Tiwari1, and M.R.Mishra, "Comparative Analysis of Stego Image Transmission through OFDM
Channel: A Simulink Model," International Journal of Science, Engineering and Technology
Research (IJSETR), Vol.4 (5), (May 2015).
[11] P.Manhas, and M.K Soni, "Comparison of Various Channel Equalization Techniques in OFDM
System using different Digital Modulations," Indonesian Journal of Electrical Engineering and
Computer Science, Vol.3 (3), pp. 634 ~ 638, (September 2016).
[12] J.Bhalani, A.I.Trivedi, Y.P.Kosta, and V. T. Patel "Performance Comparison of Non-Linear and
Adaptive Equalization Algorithms for Wireless Digital Communication," First Asian Himalayas
International Conference on Internet, (2009).
[13] K. Elangovan, “Comparative study on the channel estimation for OFDM system using LMS, NLMS
and RLS algorithms,” In Pattern Recognition, Informatics and Medical Engineering (PRIME).
International Conference on IEEE. pp. 359-363 (2012).
[14] MLSE Equalizers Retrieved from MATLAB & Simulink.
[15] Er.M.Maheswari, S.Selvabharathi, and V.Subasri, "An End to End Simulation of Wireless
Communication through AWGN and Fading Channel, "International Journal of Creative Research
Thoughts (IJCRT), Vol.8 (4), (April 2020).