SlideShare a Scribd company logo
ISSN: 2278 - 1323
International Journal of Advanced Research in Computer Engineering and Technology (IJARCET)
Volume 2, Issue 6, June 2013
2052
www.ijarcet.org
Abstract— This paper examines the implementation of the
Genetic Algorithm (GA) optimized Singular Value
Decomposition (SVD) method to detect the presence of wireless
signal. We simulated the algorithm using common digital
signal in wireless communication namely rectangular pulse,
raised cosine and root-raised cosine to test performance of the
signal detector. The algorithm is suitable for blind spectrum
sensing where the properties of the signal to be detected are
unknown. The GA optimized SVD gives better result in the low
signal to noise (SNR) environment.
Index Terms— Cognitive radio, Genetic algorithm, signal
detector, singular value decomposition (SVD), spectrum
sensing.
I. INTRODUCTION
Cognitive radio(CR) is emerging as key enabling
technology for improving the utilization of electromagnetic
spectrum. The term cognitive radio was coined by Joseph
Mitola [1].Spectrum sensing is one of the most important
function in cognitive radio for the efficient utilization of
spectrum. Spectrum sensing is one of the major steps of
spectrum management, spectrum management consist of
four major steps [2]: 1) spectrum sensing,2)decision
making,3)Spectrum sharing and 4) Spectrum mobility.
Spectrum sensing aims to determine spectrum availability
and the presence of licensed users or primary user. Spectrum
decision is to predict how long the spectrum holes are likely
to remain available for use to the unlicensed users or
secondary users. Spectrum sharing is to distribute the
spectrum holes fairly among the secondary users bearing in
mind usage cost. Spectrum mobility is to maintain seamless
communication requirements during the transition to better
spectrum.
There are various spectrum sensing techniques such as
energy detection (ED), the eigenvalue based detection, the
covariance based detection, feature based detection, and
singular value based detection. These methods are discussed
in [3], [4], [5].
Eigenvalue based detection techniques achieve
both high probability of detection and low probability of
false alarm with minimal knowledge about the primary user
signals [6].The SVD method is quite similar to the
eigenvalue decomposition method, but it can be applied to
Manuscript received June, 2013.
Nidhi Chandel, Electronics and Communication department, RGPV
University,IES IPS Acadeny Indore, India, 9301818435
Rajesh B. Ahirwar Electronics and Communication department, RGPV
University,IES IPS Acdemy,Indore,India,9993374418.,
matrix while, eigenvalue decomposition is only
applicable to matrix.SVD has several advantage as
compared to the other decomposition method as it is more
robust to numerical error [7].Genetic algorithm is an
iterative process defined by Holland [8] as a metaphor of
the Darwinian theory of evolution applied to biology
Genetic algorithm is an optimization technique here it is
used to optimize the value of L(number of column ) in
covariance matrix.GA optimized SVD gives better result as
compared to SVD based detection.
The rest of the paper is organized as follows. Common
signal detection model for spectrum sensing is introduced in
section II. SVD based signal detection given in section III.
Genetic Algorithm is described in section IV. Algorithm for
signal detection given in section V. In section VI threshold
value is determined. In Section VII, simulation parameters
and results of implementing GA optimized SVD based
signal detector is described. Finally conclusion is given in
section VIII.
II. SYSTEM MODEL
In spectrum sensing technique, for detecting a signal two
hypothesis are involved. and . is null hypothesis,
meaning signal does not present; , means signal is
present. The received signal under two hypothesis is given
as [9],[10].
H0: y(n )= w(n) (1)
H1 : y(n) = s(n)+ w(n) (2)
Where,
y(n): is a received signal
s(n): is a transmitted signal samples
w(n): is white noise which is independent and
identically distributed. The decision statistics of the energy
detector [4] can be defined as the average energy of N
observed samples
(3)
There are two probabilities involved for signal detection:
probability of detection Pd which defines the hypothesis .
Probability of false alarm; which defines at hypothesis
[9].
(4)
(5)
GA optimized SVD based signal detector for
Cognitive radio Networks
Nidhi Chandel and Mr. Rajesh B. Ahirwar
ISSN: 2278 - 1323
International Journal of Advanced Research in Computer Engineering and Technology (IJARCET)
Volume 2, Issue 6, June 2013
2053
www.ijarcet.org
III. SVD BASED SIGNAL DETECTOR
SVD plays an important role in statistics and signal
processing and, particularly in the area of a linear system.
For a time series y (n) with n=1, 2….N, a matrix with L
column and M=N-L+1 rows is constructed,
(6)
Here, A is an M×L matrix. Its elements can be found by
substituting of y (n), Using SVD [11], A can be factorized as
A= U S
(7)
Where, U and V are an M×M and L×L unitary matrix
respectively. The columns of U and V are called left and
right singular vectors, for A. S is diagonal matrix whose non
negative entries are arranged in diagonal in a decreasing
manner. S is a rectangular matrix with the same dimension
as A. When signals are received whose power is higher than
the threshold, there exist several dominant singular values to
represent these signals
In implementing SVD based signal detector, we adopt
method by Zeng and Liang (2007) in [12].SVD based signal
detector has following algorithm to detect the presence of
signal
Step 1:Select the number of column of covariance matrix
L.
Step 2: Factorized the matrix using SVD to form equation
as in (7).
Step 3:Obtain maximum and minimum Eigenvalues of
matrix which are and
Step 4: Compute threshold value, γ.
Step 5: Compare the ratio with the threshold. If
the signal is present, otherwise the signal is not present.
IV. GENETIC ALGORITHM
GA is an iterative process. Each iteration is called a
generation. A typical number of generations for a simple
GA can range from 50 to over 500. In a genetic algorithm, a
population of strings, which encode candidate solutions to
an optimization problem, evolves toward better solutions.
Solutions are represented in binary as strings of 0s and 1s,
but other encodings are also possible. Flow chart of genetic
algorithm is shown in figure1.
V. ALGORITHM FOR GA OPTIMIZED SVD BASED SIGNAL
DETECTOR
Step 1: Optimized the value of L,by Genetic algorithm.
Step 2: Factorized the matrix using SVD to form equation as
in (7)
Step 3: Obtain maximum and minimum Eigenvalues of
matrix which are and .
Step 4: Compute threshold value, γ. The threshold value
determination will be highlighted in the next section.
Step 5: Compare the ratio with the threshold.
If the signal is present, otherwise the signal is
not present.
Figure1.Flow chart of the Genetic Algorithm [13]
VI. THRESHOLD DETERMINATION
In terms of desired probability of false alarm ,detection
threshold can be calculated by using the results of the
theorem in [14] and [12] and it is given as follows(here
M=1)
Where, denotes detection threshold. denotes
the inverse of cumulative distribution function of the Tracy
Widom distribution of order 1 [15]. is the number of
samples and L denotes the level of covariance matrix.
The density of test statistic, is required to define
threshold in terms of probability of false alarm or vice versa
and is defined as, the ratio of maximum eigenvalues to
minimum eigenvalues of received signal of covariance
matrix as follows:
(9)
start
Create randomly selected initial
population
Fitness evaluation
Optimal
solution ?
Stop
Reproduction
Fit
Chromosome
?
Mutation
Discard
Yes
No
Yes
No
ISSN: 2278 - 1323
International Journal of Advanced Research in Computer Engineering and Technology (IJARCET)
Volume 2, Issue 6, June 2013
2054
www.ijarcet.org
VII. SIMULATION PARAMETERS AND RESULTS
A. Simulation parameters
Additive white Gaussian noise channel is used. It is
assumed that the channel is not changing during the period
of samples. The results are averaged over 1000 tests using
Monte Carlo simulations written in MATLAB. Simulation
results are taken using MPSK modulated random primary
signal and independent and identically distributed (iid) noise
sample with Gaussian distribution are used. Three types of
signal namely rectangular pulse, raised cosine and root-
raised cosine were listed and compared. To find the
threshold, we require the probability of false alarm is Pfa 0.1
and probability of detection is Pd 0.9 as required by IEEE
802.22 standard.
B. Simulation results
Figure 1 shows simulation results of the probability of
detection (Pd) when the GA optimized SVD method and
SVD method are used for comparison when SNR ranges
from -16 dB to -4 dB. From these figures, it can be
concluded that the GA optimized SVD based detection gives
better results than SVD based detection in low SNR. It can
be noticed from the graph that the performance of the SVD
method and GA optimized SVD are nearly equal at -6 dB
,while GA optimized SVD shows better results at -16 dB for
all the three signals ,rectangular pulse signal, raised cosine
and root-raised cosine. Although SVD at certain points
better than the GA optimized SVD method for root raised
cosine signal, but the overall performance of the detector is
better than the SVD method.
-16 -14 -12 -10 -8 -6 -4
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
SNR (db)
Probabilityofdetection(pd
)
Rectangular Pulse
SVD
GA
a) Rectangular pulse signal
-16 -14 -12 -10 -8 -6 -4
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
SNR (db)
Probabilityofdetection(p
d
)
Raised Cosine
SVD
GA
b) Raised cosine signal
-16 -14 -12 -10 -8 -6 -4
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
SNR (db)
Probabilityofdetection(Pd
)
Root Raised Cosine
SVD
GA
c) Root- raised cosine signal
Figure2: Comparision of Pd between the SVD method and
energy detector for (a) Rectangular pulse signal; (b) Raised
cosine signal(c) Root-raised cosine signal
In terms of performance of the detector, the receiver
operating characteristic (ROC) curves are shown in figure2.
Both methods were simulated at -16 dB SNR and tested for
three types of signal we plot the Pd under H1 against Pfa
under Ho when Pfa changes from 0.01 to the desired value
of 0.1.It is clearly shown that the ROC curves of the GA
optimized based detection are higher than the SVD method
which proves the good performance of the detector.
0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08 0.09 0.1
0.1
0.12
0.14
0.16
0.18
0.2
0.22
Probability of false alarm (Pfa
)
Probabilityofdetection(Pd
)
Rectangular Pulse
SVD
GA
a) Rectangular pulse signal
0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08 0.09 0.1
0.08
0.1
0.12
0.14
0.16
0.18
0.2
0.22
Probability of false alarm (Pfa
)
Probabilityofdetection(Pd
)
Raised Cosine
SVD
GA
b) Raised cosine signal
ISSN: 2278 - 1323
International Journal of Advanced Research in Computer Engineering and Technology (IJARCET)
Volume 2, Issue 6, June 2013
2055
www.ijarcet.org
0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08 0.09 0.1
0.1
0.12
0.14
0.16
0.18
0.2
0.22
Probability of false alarm (Pfa
)
Probabilityofdetection(Pd
)
Root Raised Cosine
SVD
GA
c) Root-raised cosine signal
Figure3: Comparision of ROC curves between SVD
method and energy detector for a) Rectangular pulse
signal)Raised cosine signal c) Root-raised cosine signal
VIII. CONCLUSION
In this paper, we implemented a GA optimized SVD-
based approach to detect common signals in today’s digital
communication system. The rationale of detecting common
signals is that, in order for a Cognitive Radio system to
operate with an expectable quality of service. The brief
simulation results show that GA optimized SVD of the data
matrix finds the optimized value of L (no. of column).The
method is more robust to numerical errors and very fast.
These qualities are desirable in IEEE 802.22 standard since
it is easily suited the need to shorten the period of sensing
spectrum.
.
REFERENCES
[1] J. Mitola and G. Q. Maguire, “Cognitive radio: making software
radios more personal,” Personal Communications, IEEE, vol. 6, no. 4,
pp. 13–18, Aug. 1999.
[2] S. Haykin, “Cognitive radio: brain-empowered wireless
communications,” IEEE Journal on Selected Areas in
Communications, vol. 23, no. 2, pp. 201–220, Feb. 2005.
[3] S. Xu, Y. Shang, and H. Wang, “Svd based sensing of a wireless
microphone signal in cognitive radio networks,” in 11th IEEE
Singapore International Conference on Communication Systems,
2008 (ICCS 2008), 2008, pp. 222 –226.
[4] T. Yucek and H. Arslan, “A survey of spectrum sensing algorithms
for cognitive radio applications,” Communications Surveys Tutorials,
IEEE, vol. 11, no. 1, pp. 116 –130, 2009.
[5] I. F. Akyildiz, W.-Y. Lee, M. C. Vuran, and S. Mohanty, “NeXt
generation/dynamic spectrum access/cognitive radio wireless
networks: a survey,” Comput. Netw., vol. 50, no. 13, pp. 2127–2159,
2006
[6] A. Kortun, T. Ratnarajah, M. Sellathurai, and C. Zhong, “On the
performance of eigenvalue-based spectrum sensing for cognitive
radio,” in New Frontiers in Dynamic Spectrum, 2010 IEEE
Symposium on, 2010, pp. 1 –6.
[7] S. Leach, “Singular value decomposition – a primer,” Solutions, p. 8,
2000. [Online].
Available:http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.
6587
[8] Holland, J. 1975. Adaptation in Natural and Artificial Systems.
University of Michigan Press
[9] Beibei Wang and K. J. Ray Liu, “Advances in Cognitive Radio
Networks: A Survey,” in IEEE journal of selected topics in signal
processing,vol.5,no.1,February 2011,pp.5-23.
[10] A. Sahai and D. Cabric, “Spectrum sensing: Fundamental limits and
practical challenges,” in IEEE International Symposium on New
Frontiers Dynamic Spectrum Access Networks (DySPAN),
November 2005, Baltimore, MD.
[11] D. Tufts and R. Kumaresan, “Singular value decomposition and
improved frequency estimation using linear prediction,” Acoustics,
Speech and Signal Processing, IEEE Transactions on, vol. 30, no. 4,
pp. 671 – 675, Aug..
[12] 1982Y. Zeng and Y.-C. Liang, “Maximum-minimum eigenvalue
detection for cognitive radio,” in IEEE 18th International Symposium
on Personal, Indoor and Mobile Radio Communications PIMRC
2007., 2007, pp. 1 –5
[13] Sapna Katiyar, A Comparative Study of Genetic Algorithm and the
Particle Swarm Optimization,” A.B.E.S. Institute of Technology,
Ghaziabad
[14] I. M. Johnstone, “On the distribution of the largest eigenvalue in
principal components analysis,” Annals of Statistics, vol. 29, no. 2,
pp. 295–327, 2001.
[15] C. A. Tracy and H. Widom, The distribution of the largest eigenvalue
in the Gaussian ensembles, ser. CRM Series in Mathematical Physics
4. New York: Springer-Verlag, 2000, pp. 641–472.

More Related Content

What's hot

A statistical approach to spectrum sensing using bayes factor and p-Values
A statistical approach to spectrum sensing using bayes factor and p-ValuesA statistical approach to spectrum sensing using bayes factor and p-Values
A statistical approach to spectrum sensing using bayes factor and p-Values
IJECEIAES
 
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor NetworksA New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
idescitation
 
Quality Prediction in Fingerprint Compression
Quality Prediction in Fingerprint CompressionQuality Prediction in Fingerprint Compression
Quality Prediction in Fingerprint Compression
IJTET Journal
 
Diagnosis of Faulty Sensors in Antenna Array using Hybrid Differential Evolut...
Diagnosis of Faulty Sensors in Antenna Array using Hybrid Differential Evolut...Diagnosis of Faulty Sensors in Antenna Array using Hybrid Differential Evolut...
Diagnosis of Faulty Sensors in Antenna Array using Hybrid Differential Evolut...
IJECEIAES
 
Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...
Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...
Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...
IJMTST Journal
 
Virtual 2 d positioning system by using wireless sensors in indoor environment
Virtual 2 d positioning system by using wireless sensors in indoor environmentVirtual 2 d positioning system by using wireless sensors in indoor environment
Virtual 2 d positioning system by using wireless sensors in indoor environment
ijwmn
 
Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...
Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...
Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...
IJERA Editor
 
Neural Network Algorithm for Radar Signal Recognition
Neural Network Algorithm for Radar Signal RecognitionNeural Network Algorithm for Radar Signal Recognition
Neural Network Algorithm for Radar Signal Recognition
IJERA Editor
 
Novel algorithms for Knowledge discovery from neural networks in Classificat...
Novel algorithms for  Knowledge discovery from neural networks in Classificat...Novel algorithms for  Knowledge discovery from neural networks in Classificat...
Novel algorithms for Knowledge discovery from neural networks in Classificat...
Dr.(Mrs).Gethsiyal Augasta
 
1103.0305
1103.03051103.0305
1103.0305
nk179
 
Ijecet 06 06_002
Ijecet 06 06_002Ijecet 06 06_002
Ijecet 06 06_002
IAEME Publication
 
11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...
Alexander Decker
 
Rfid based localization
Rfid based localizationRfid based localization
Rfid based localization
Mehjabin Sultana
 
F045033440
F045033440F045033440
F045033440
IJERA Editor
 
Advanced atpg based on fan, testability measures and fault reduction
Advanced atpg based on fan, testability measures and fault reductionAdvanced atpg based on fan, testability measures and fault reduction
Advanced atpg based on fan, testability measures and fault reduction
VLSICS Design
 
Intelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural NetworkIntelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural Network
IJERA Editor
 
Bounds on the Achievable Rates of Faded Dirty Paper Channel
Bounds on the Achievable Rates of Faded Dirty Paper Channel Bounds on the Achievable Rates of Faded Dirty Paper Channel
Bounds on the Achievable Rates of Faded Dirty Paper Channel
IJCNCJournal
 
Performance Analysis of Group-Blind Multiuser Detectors for Synchronous CDMA
Performance Analysis of Group-Blind Multiuser Detectors for Synchronous CDMAPerformance Analysis of Group-Blind Multiuser Detectors for Synchronous CDMA
Performance Analysis of Group-Blind Multiuser Detectors for Synchronous CDMA
idescitation
 
Spectrum Sensing Detection Techniques for Overlay Users
Spectrum Sensing Detection Techniques for Overlay UsersSpectrum Sensing Detection Techniques for Overlay Users
Spectrum Sensing Detection Techniques for Overlay Users
IJMTST Journal
 
Array diagnosis using compressed sensing in near field
Array diagnosis using compressed sensing in near fieldArray diagnosis using compressed sensing in near field
Array diagnosis using compressed sensing in near field
Alexander Decker
 

What's hot (20)

A statistical approach to spectrum sensing using bayes factor and p-Values
A statistical approach to spectrum sensing using bayes factor and p-ValuesA statistical approach to spectrum sensing using bayes factor and p-Values
A statistical approach to spectrum sensing using bayes factor and p-Values
 
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor NetworksA New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
 
Quality Prediction in Fingerprint Compression
Quality Prediction in Fingerprint CompressionQuality Prediction in Fingerprint Compression
Quality Prediction in Fingerprint Compression
 
Diagnosis of Faulty Sensors in Antenna Array using Hybrid Differential Evolut...
Diagnosis of Faulty Sensors in Antenna Array using Hybrid Differential Evolut...Diagnosis of Faulty Sensors in Antenna Array using Hybrid Differential Evolut...
Diagnosis of Faulty Sensors in Antenna Array using Hybrid Differential Evolut...
 
Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...
Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...
Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...
 
Virtual 2 d positioning system by using wireless sensors in indoor environment
Virtual 2 d positioning system by using wireless sensors in indoor environmentVirtual 2 d positioning system by using wireless sensors in indoor environment
Virtual 2 d positioning system by using wireless sensors in indoor environment
 
Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...
Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...
Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...
 
Neural Network Algorithm for Radar Signal Recognition
Neural Network Algorithm for Radar Signal RecognitionNeural Network Algorithm for Radar Signal Recognition
Neural Network Algorithm for Radar Signal Recognition
 
Novel algorithms for Knowledge discovery from neural networks in Classificat...
Novel algorithms for  Knowledge discovery from neural networks in Classificat...Novel algorithms for  Knowledge discovery from neural networks in Classificat...
Novel algorithms for Knowledge discovery from neural networks in Classificat...
 
1103.0305
1103.03051103.0305
1103.0305
 
Ijecet 06 06_002
Ijecet 06 06_002Ijecet 06 06_002
Ijecet 06 06_002
 
11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...
 
Rfid based localization
Rfid based localizationRfid based localization
Rfid based localization
 
F045033440
F045033440F045033440
F045033440
 
Advanced atpg based on fan, testability measures and fault reduction
Advanced atpg based on fan, testability measures and fault reductionAdvanced atpg based on fan, testability measures and fault reduction
Advanced atpg based on fan, testability measures and fault reduction
 
Intelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural NetworkIntelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural Network
 
Bounds on the Achievable Rates of Faded Dirty Paper Channel
Bounds on the Achievable Rates of Faded Dirty Paper Channel Bounds on the Achievable Rates of Faded Dirty Paper Channel
Bounds on the Achievable Rates of Faded Dirty Paper Channel
 
Performance Analysis of Group-Blind Multiuser Detectors for Synchronous CDMA
Performance Analysis of Group-Blind Multiuser Detectors for Synchronous CDMAPerformance Analysis of Group-Blind Multiuser Detectors for Synchronous CDMA
Performance Analysis of Group-Blind Multiuser Detectors for Synchronous CDMA
 
Spectrum Sensing Detection Techniques for Overlay Users
Spectrum Sensing Detection Techniques for Overlay UsersSpectrum Sensing Detection Techniques for Overlay Users
Spectrum Sensing Detection Techniques for Overlay Users
 
Array diagnosis using compressed sensing in near field
Array diagnosis using compressed sensing in near fieldArray diagnosis using compressed sensing in near field
Array diagnosis using compressed sensing in near field
 

Viewers also liked

Volume 2-issue-6-1979-1982
Volume 2-issue-6-1979-1982Volume 2-issue-6-1979-1982
Volume 2-issue-6-1979-1982
Editor IJARCET
 
1904 1908
1904 19081904 1908
1904 1908
Editor IJARCET
 
1829 1833
1829 18331829 1833
1829 1833
Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
Editor IJARCET
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Practica blog
Practica blogPractica blog
Practica blog
Fatima560s
 
Emilda
EmildaEmilda
Emilda
Paarief Udin
 
Annisa ulfah dan rusida sari xii ips 2
Annisa ulfah dan rusida sari xii ips 2Annisa ulfah dan rusida sari xii ips 2
Annisa ulfah dan rusida sari xii ips 2
Paarief Udin
 
1866 1872
1866 18721866 1872
1866 1872
Editor IJARCET
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276
Editor IJARCET
 
1816 1819
1816 18191816 1819
1816 1819
Editor IJARCET
 
Volume 2-issue-6-1950-1954
Volume 2-issue-6-1950-1954Volume 2-issue-6-1950-1954
Volume 2-issue-6-1950-1954
Editor IJARCET
 
Magfirah dinna septiani xii ips 1 tugas persentasi
Magfirah dinna septiani xii ips 1 tugas persentasiMagfirah dinna septiani xii ips 1 tugas persentasi
Magfirah dinna septiani xii ips 1 tugas persentasiPaarief Udin
 

Viewers also liked (18)

Volume 2-issue-6-1979-1982
Volume 2-issue-6-1979-1982Volume 2-issue-6-1979-1982
Volume 2-issue-6-1979-1982
 
1904 1908
1904 19081904 1908
1904 1908
 
1829 1833
1829 18331829 1833
1829 1833
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Apollo weronika
Apollo weronikaApollo weronika
Apollo weronika
 
Practica blog
Practica blogPractica blog
Practica blog
 
Emilda
EmildaEmilda
Emilda
 
Paso a paso
Paso a pasoPaso a paso
Paso a paso
 
Annisa ulfah dan rusida sari xii ips 2
Annisa ulfah dan rusida sari xii ips 2Annisa ulfah dan rusida sari xii ips 2
Annisa ulfah dan rusida sari xii ips 2
 
Erynie Ania
Erynie AniaErynie Ania
Erynie Ania
 
1866 1872
1866 18721866 1872
1866 1872
 
Archivo gbi angie
Archivo gbi angieArchivo gbi angie
Archivo gbi angie
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276
 
1816 1819
1816 18191816 1819
1816 1819
 
Volume 2-issue-6-1950-1954
Volume 2-issue-6-1950-1954Volume 2-issue-6-1950-1954
Volume 2-issue-6-1950-1954
 
Magfirah dinna septiani xii ips 1 tugas persentasi
Magfirah dinna septiani xii ips 1 tugas persentasiMagfirah dinna septiani xii ips 1 tugas persentasi
Magfirah dinna septiani xii ips 1 tugas persentasi
 

Similar to Volume 2-issue-6-2052-2055

Cooperative Spectrum Sensing Technique Based on Blind Detection Method
Cooperative Spectrum Sensing Technique Based on Blind Detection MethodCooperative Spectrum Sensing Technique Based on Blind Detection Method
Cooperative Spectrum Sensing Technique Based on Blind Detection Method
INFOGAIN PUBLICATION
 
Performance analysis of cooperative spectrum sensing using double dynamic thr...
Performance analysis of cooperative spectrum sensing using double dynamic thr...Performance analysis of cooperative spectrum sensing using double dynamic thr...
Performance analysis of cooperative spectrum sensing using double dynamic thr...
IAESIJAI
 
Analysis of spectrum based approach for detection of mobile signals
Analysis of spectrum based approach for detection of mobile signalsAnalysis of spectrum based approach for detection of mobile signals
Analysis of spectrum based approach for detection of mobile signals
IAEME Publication
 
A combined spectrum sensing method based DCT for cognitive radio system
A combined spectrum sensing method based DCT for cognitive radio system  A combined spectrum sensing method based DCT for cognitive radio system
A combined spectrum sensing method based DCT for cognitive radio system
IJECEIAES
 
QRC-ESPRIT Method for Wideband Signals
QRC-ESPRIT Method for Wideband SignalsQRC-ESPRIT Method for Wideband Signals
QRC-ESPRIT Method for Wideband Signals
IDES Editor
 
Jurnal puput dani prasetyo adi
Jurnal puput dani prasetyo adiJurnal puput dani prasetyo adi
Jurnal puput dani prasetyo adi
Puput Dani
 
Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...
Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...
Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...
sipij
 
14 a blind edit ms word (edit tyas)2
14 a blind edit ms word (edit tyas)214 a blind edit ms word (edit tyas)2
14 a blind edit ms word (edit tyas)2
IAESIJEECS
 
Automatic digital modulation recognition using articial
Automatic digital modulation recognition using articialAutomatic digital modulation recognition using articial
Automatic digital modulation recognition using articial
Hemant Ingale
 
Distributed fault tolerant event
Distributed fault tolerant eventDistributed fault tolerant event
Distributed fault tolerant event
ijscai
 
Performance comparison of automatic peak detection for signal analyser
Performance comparison of automatic peak detection for signal analyserPerformance comparison of automatic peak detection for signal analyser
Performance comparison of automatic peak detection for signal analyser
journalBEEI
 
An ann approach for network
An ann approach for networkAn ann approach for network
An ann approach for network
IJNSA Journal
 
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
IJNSA Journal
 
Rigorous Pack Edge Detection Fuzzy System
Rigorous Pack Edge Detection Fuzzy SystemRigorous Pack Edge Detection Fuzzy System
Rigorous Pack Edge Detection Fuzzy System
inventy
 
A Sphere Decoding Algorithm for MIMO
A Sphere Decoding Algorithm for MIMOA Sphere Decoding Algorithm for MIMO
A Sphere Decoding Algorithm for MIMO
IRJET Journal
 
Analysis and Comparison of Different Spectrum Sensing Technique for WLAN
Analysis and Comparison of Different Spectrum Sensing Technique for WLANAnalysis and Comparison of Different Spectrum Sensing Technique for WLAN
Analysis and Comparison of Different Spectrum Sensing Technique for WLAN
ijtsrd
 
New Data Association Technique for Target Tracking in Dense Clutter Environme...
New Data Association Technique for Target Tracking in Dense Clutter Environme...New Data Association Technique for Target Tracking in Dense Clutter Environme...
New Data Association Technique for Target Tracking in Dense Clutter Environme...
CSCJournals
 
Hardware efficient singular value decomposition in mimo ofdm system
Hardware efficient singular value decomposition in mimo ofdm systemHardware efficient singular value decomposition in mimo ofdm system
Hardware efficient singular value decomposition in mimo ofdm system
IAEME Publication
 
Weighted Least Squared Approach to Fault Detection and Isolation for GPS Inte...
Weighted Least Squared Approach to Fault Detection and Isolation for GPS Inte...Weighted Least Squared Approach to Fault Detection and Isolation for GPS Inte...
Weighted Least Squared Approach to Fault Detection and Isolation for GPS Inte...
TELKOMNIKA JOURNAL
 
Error bounds for wireless localization in NLOS environments
Error bounds for wireless localization in NLOS environmentsError bounds for wireless localization in NLOS environments
Error bounds for wireless localization in NLOS environments
IJECEIAES
 

Similar to Volume 2-issue-6-2052-2055 (20)

Cooperative Spectrum Sensing Technique Based on Blind Detection Method
Cooperative Spectrum Sensing Technique Based on Blind Detection MethodCooperative Spectrum Sensing Technique Based on Blind Detection Method
Cooperative Spectrum Sensing Technique Based on Blind Detection Method
 
Performance analysis of cooperative spectrum sensing using double dynamic thr...
Performance analysis of cooperative spectrum sensing using double dynamic thr...Performance analysis of cooperative spectrum sensing using double dynamic thr...
Performance analysis of cooperative spectrum sensing using double dynamic thr...
 
Analysis of spectrum based approach for detection of mobile signals
Analysis of spectrum based approach for detection of mobile signalsAnalysis of spectrum based approach for detection of mobile signals
Analysis of spectrum based approach for detection of mobile signals
 
A combined spectrum sensing method based DCT for cognitive radio system
A combined spectrum sensing method based DCT for cognitive radio system  A combined spectrum sensing method based DCT for cognitive radio system
A combined spectrum sensing method based DCT for cognitive radio system
 
QRC-ESPRIT Method for Wideband Signals
QRC-ESPRIT Method for Wideband SignalsQRC-ESPRIT Method for Wideband Signals
QRC-ESPRIT Method for Wideband Signals
 
Jurnal puput dani prasetyo adi
Jurnal puput dani prasetyo adiJurnal puput dani prasetyo adi
Jurnal puput dani prasetyo adi
 
Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...
Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...
Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...
 
14 a blind edit ms word (edit tyas)2
14 a blind edit ms word (edit tyas)214 a blind edit ms word (edit tyas)2
14 a blind edit ms word (edit tyas)2
 
Automatic digital modulation recognition using articial
Automatic digital modulation recognition using articialAutomatic digital modulation recognition using articial
Automatic digital modulation recognition using articial
 
Distributed fault tolerant event
Distributed fault tolerant eventDistributed fault tolerant event
Distributed fault tolerant event
 
Performance comparison of automatic peak detection for signal analyser
Performance comparison of automatic peak detection for signal analyserPerformance comparison of automatic peak detection for signal analyser
Performance comparison of automatic peak detection for signal analyser
 
An ann approach for network
An ann approach for networkAn ann approach for network
An ann approach for network
 
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
 
Rigorous Pack Edge Detection Fuzzy System
Rigorous Pack Edge Detection Fuzzy SystemRigorous Pack Edge Detection Fuzzy System
Rigorous Pack Edge Detection Fuzzy System
 
A Sphere Decoding Algorithm for MIMO
A Sphere Decoding Algorithm for MIMOA Sphere Decoding Algorithm for MIMO
A Sphere Decoding Algorithm for MIMO
 
Analysis and Comparison of Different Spectrum Sensing Technique for WLAN
Analysis and Comparison of Different Spectrum Sensing Technique for WLANAnalysis and Comparison of Different Spectrum Sensing Technique for WLAN
Analysis and Comparison of Different Spectrum Sensing Technique for WLAN
 
New Data Association Technique for Target Tracking in Dense Clutter Environme...
New Data Association Technique for Target Tracking in Dense Clutter Environme...New Data Association Technique for Target Tracking in Dense Clutter Environme...
New Data Association Technique for Target Tracking in Dense Clutter Environme...
 
Hardware efficient singular value decomposition in mimo ofdm system
Hardware efficient singular value decomposition in mimo ofdm systemHardware efficient singular value decomposition in mimo ofdm system
Hardware efficient singular value decomposition in mimo ofdm system
 
Weighted Least Squared Approach to Fault Detection and Isolation for GPS Inte...
Weighted Least Squared Approach to Fault Detection and Isolation for GPS Inte...Weighted Least Squared Approach to Fault Detection and Isolation for GPS Inte...
Weighted Least Squared Approach to Fault Detection and Isolation for GPS Inte...
 
Error bounds for wireless localization in NLOS environments
Error bounds for wireless localization in NLOS environmentsError bounds for wireless localization in NLOS environments
Error bounds for wireless localization in NLOS environments
 

More from Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
Editor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
Editor IJARCET
 
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101
Editor IJARCET
 

More from Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101
 

Recently uploaded

GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
maazsz111
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
marufrahmanstratejm
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
LucaBarbaro3
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
Dinusha Kumarasiri
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 

Recently uploaded (20)

GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
SAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloudSAP S/4 HANA sourcing and procurement to Public cloud
SAP S/4 HANA sourcing and procurement to Public cloud
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
Public CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptxPublic CyberSecurity Awareness Presentation 2024.pptx
Public CyberSecurity Awareness Presentation 2024.pptx
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Trusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process MiningTrusted Execution Environment for Decentralized Process Mining
Trusted Execution Environment for Decentralized Process Mining
 
Azure API Management to expose backend services securely
Azure API Management to expose backend services securelyAzure API Management to expose backend services securely
Azure API Management to expose backend services securely
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 

Volume 2-issue-6-2052-2055

  • 1. ISSN: 2278 - 1323 International Journal of Advanced Research in Computer Engineering and Technology (IJARCET) Volume 2, Issue 6, June 2013 2052 www.ijarcet.org Abstract— This paper examines the implementation of the Genetic Algorithm (GA) optimized Singular Value Decomposition (SVD) method to detect the presence of wireless signal. We simulated the algorithm using common digital signal in wireless communication namely rectangular pulse, raised cosine and root-raised cosine to test performance of the signal detector. The algorithm is suitable for blind spectrum sensing where the properties of the signal to be detected are unknown. The GA optimized SVD gives better result in the low signal to noise (SNR) environment. Index Terms— Cognitive radio, Genetic algorithm, signal detector, singular value decomposition (SVD), spectrum sensing. I. INTRODUCTION Cognitive radio(CR) is emerging as key enabling technology for improving the utilization of electromagnetic spectrum. The term cognitive radio was coined by Joseph Mitola [1].Spectrum sensing is one of the most important function in cognitive radio for the efficient utilization of spectrum. Spectrum sensing is one of the major steps of spectrum management, spectrum management consist of four major steps [2]: 1) spectrum sensing,2)decision making,3)Spectrum sharing and 4) Spectrum mobility. Spectrum sensing aims to determine spectrum availability and the presence of licensed users or primary user. Spectrum decision is to predict how long the spectrum holes are likely to remain available for use to the unlicensed users or secondary users. Spectrum sharing is to distribute the spectrum holes fairly among the secondary users bearing in mind usage cost. Spectrum mobility is to maintain seamless communication requirements during the transition to better spectrum. There are various spectrum sensing techniques such as energy detection (ED), the eigenvalue based detection, the covariance based detection, feature based detection, and singular value based detection. These methods are discussed in [3], [4], [5]. Eigenvalue based detection techniques achieve both high probability of detection and low probability of false alarm with minimal knowledge about the primary user signals [6].The SVD method is quite similar to the eigenvalue decomposition method, but it can be applied to Manuscript received June, 2013. Nidhi Chandel, Electronics and Communication department, RGPV University,IES IPS Acadeny Indore, India, 9301818435 Rajesh B. Ahirwar Electronics and Communication department, RGPV University,IES IPS Acdemy,Indore,India,9993374418., matrix while, eigenvalue decomposition is only applicable to matrix.SVD has several advantage as compared to the other decomposition method as it is more robust to numerical error [7].Genetic algorithm is an iterative process defined by Holland [8] as a metaphor of the Darwinian theory of evolution applied to biology Genetic algorithm is an optimization technique here it is used to optimize the value of L(number of column ) in covariance matrix.GA optimized SVD gives better result as compared to SVD based detection. The rest of the paper is organized as follows. Common signal detection model for spectrum sensing is introduced in section II. SVD based signal detection given in section III. Genetic Algorithm is described in section IV. Algorithm for signal detection given in section V. In section VI threshold value is determined. In Section VII, simulation parameters and results of implementing GA optimized SVD based signal detector is described. Finally conclusion is given in section VIII. II. SYSTEM MODEL In spectrum sensing technique, for detecting a signal two hypothesis are involved. and . is null hypothesis, meaning signal does not present; , means signal is present. The received signal under two hypothesis is given as [9],[10]. H0: y(n )= w(n) (1) H1 : y(n) = s(n)+ w(n) (2) Where, y(n): is a received signal s(n): is a transmitted signal samples w(n): is white noise which is independent and identically distributed. The decision statistics of the energy detector [4] can be defined as the average energy of N observed samples (3) There are two probabilities involved for signal detection: probability of detection Pd which defines the hypothesis . Probability of false alarm; which defines at hypothesis [9]. (4) (5) GA optimized SVD based signal detector for Cognitive radio Networks Nidhi Chandel and Mr. Rajesh B. Ahirwar
  • 2. ISSN: 2278 - 1323 International Journal of Advanced Research in Computer Engineering and Technology (IJARCET) Volume 2, Issue 6, June 2013 2053 www.ijarcet.org III. SVD BASED SIGNAL DETECTOR SVD plays an important role in statistics and signal processing and, particularly in the area of a linear system. For a time series y (n) with n=1, 2….N, a matrix with L column and M=N-L+1 rows is constructed, (6) Here, A is an M×L matrix. Its elements can be found by substituting of y (n), Using SVD [11], A can be factorized as A= U S (7) Where, U and V are an M×M and L×L unitary matrix respectively. The columns of U and V are called left and right singular vectors, for A. S is diagonal matrix whose non negative entries are arranged in diagonal in a decreasing manner. S is a rectangular matrix with the same dimension as A. When signals are received whose power is higher than the threshold, there exist several dominant singular values to represent these signals In implementing SVD based signal detector, we adopt method by Zeng and Liang (2007) in [12].SVD based signal detector has following algorithm to detect the presence of signal Step 1:Select the number of column of covariance matrix L. Step 2: Factorized the matrix using SVD to form equation as in (7). Step 3:Obtain maximum and minimum Eigenvalues of matrix which are and Step 4: Compute threshold value, γ. Step 5: Compare the ratio with the threshold. If the signal is present, otherwise the signal is not present. IV. GENETIC ALGORITHM GA is an iterative process. Each iteration is called a generation. A typical number of generations for a simple GA can range from 50 to over 500. In a genetic algorithm, a population of strings, which encode candidate solutions to an optimization problem, evolves toward better solutions. Solutions are represented in binary as strings of 0s and 1s, but other encodings are also possible. Flow chart of genetic algorithm is shown in figure1. V. ALGORITHM FOR GA OPTIMIZED SVD BASED SIGNAL DETECTOR Step 1: Optimized the value of L,by Genetic algorithm. Step 2: Factorized the matrix using SVD to form equation as in (7) Step 3: Obtain maximum and minimum Eigenvalues of matrix which are and . Step 4: Compute threshold value, γ. The threshold value determination will be highlighted in the next section. Step 5: Compare the ratio with the threshold. If the signal is present, otherwise the signal is not present. Figure1.Flow chart of the Genetic Algorithm [13] VI. THRESHOLD DETERMINATION In terms of desired probability of false alarm ,detection threshold can be calculated by using the results of the theorem in [14] and [12] and it is given as follows(here M=1) Where, denotes detection threshold. denotes the inverse of cumulative distribution function of the Tracy Widom distribution of order 1 [15]. is the number of samples and L denotes the level of covariance matrix. The density of test statistic, is required to define threshold in terms of probability of false alarm or vice versa and is defined as, the ratio of maximum eigenvalues to minimum eigenvalues of received signal of covariance matrix as follows: (9) start Create randomly selected initial population Fitness evaluation Optimal solution ? Stop Reproduction Fit Chromosome ? Mutation Discard Yes No Yes No
  • 3. ISSN: 2278 - 1323 International Journal of Advanced Research in Computer Engineering and Technology (IJARCET) Volume 2, Issue 6, June 2013 2054 www.ijarcet.org VII. SIMULATION PARAMETERS AND RESULTS A. Simulation parameters Additive white Gaussian noise channel is used. It is assumed that the channel is not changing during the period of samples. The results are averaged over 1000 tests using Monte Carlo simulations written in MATLAB. Simulation results are taken using MPSK modulated random primary signal and independent and identically distributed (iid) noise sample with Gaussian distribution are used. Three types of signal namely rectangular pulse, raised cosine and root- raised cosine were listed and compared. To find the threshold, we require the probability of false alarm is Pfa 0.1 and probability of detection is Pd 0.9 as required by IEEE 802.22 standard. B. Simulation results Figure 1 shows simulation results of the probability of detection (Pd) when the GA optimized SVD method and SVD method are used for comparison when SNR ranges from -16 dB to -4 dB. From these figures, it can be concluded that the GA optimized SVD based detection gives better results than SVD based detection in low SNR. It can be noticed from the graph that the performance of the SVD method and GA optimized SVD are nearly equal at -6 dB ,while GA optimized SVD shows better results at -16 dB for all the three signals ,rectangular pulse signal, raised cosine and root-raised cosine. Although SVD at certain points better than the GA optimized SVD method for root raised cosine signal, but the overall performance of the detector is better than the SVD method. -16 -14 -12 -10 -8 -6 -4 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 SNR (db) Probabilityofdetection(pd ) Rectangular Pulse SVD GA a) Rectangular pulse signal -16 -14 -12 -10 -8 -6 -4 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 SNR (db) Probabilityofdetection(p d ) Raised Cosine SVD GA b) Raised cosine signal -16 -14 -12 -10 -8 -6 -4 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 SNR (db) Probabilityofdetection(Pd ) Root Raised Cosine SVD GA c) Root- raised cosine signal Figure2: Comparision of Pd between the SVD method and energy detector for (a) Rectangular pulse signal; (b) Raised cosine signal(c) Root-raised cosine signal In terms of performance of the detector, the receiver operating characteristic (ROC) curves are shown in figure2. Both methods were simulated at -16 dB SNR and tested for three types of signal we plot the Pd under H1 against Pfa under Ho when Pfa changes from 0.01 to the desired value of 0.1.It is clearly shown that the ROC curves of the GA optimized based detection are higher than the SVD method which proves the good performance of the detector. 0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08 0.09 0.1 0.1 0.12 0.14 0.16 0.18 0.2 0.22 Probability of false alarm (Pfa ) Probabilityofdetection(Pd ) Rectangular Pulse SVD GA a) Rectangular pulse signal 0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08 0.09 0.1 0.08 0.1 0.12 0.14 0.16 0.18 0.2 0.22 Probability of false alarm (Pfa ) Probabilityofdetection(Pd ) Raised Cosine SVD GA b) Raised cosine signal
  • 4. ISSN: 2278 - 1323 International Journal of Advanced Research in Computer Engineering and Technology (IJARCET) Volume 2, Issue 6, June 2013 2055 www.ijarcet.org 0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08 0.09 0.1 0.1 0.12 0.14 0.16 0.18 0.2 0.22 Probability of false alarm (Pfa ) Probabilityofdetection(Pd ) Root Raised Cosine SVD GA c) Root-raised cosine signal Figure3: Comparision of ROC curves between SVD method and energy detector for a) Rectangular pulse signal)Raised cosine signal c) Root-raised cosine signal VIII. CONCLUSION In this paper, we implemented a GA optimized SVD- based approach to detect common signals in today’s digital communication system. The rationale of detecting common signals is that, in order for a Cognitive Radio system to operate with an expectable quality of service. The brief simulation results show that GA optimized SVD of the data matrix finds the optimized value of L (no. of column).The method is more robust to numerical errors and very fast. These qualities are desirable in IEEE 802.22 standard since it is easily suited the need to shorten the period of sensing spectrum. . REFERENCES [1] J. Mitola and G. Q. Maguire, “Cognitive radio: making software radios more personal,” Personal Communications, IEEE, vol. 6, no. 4, pp. 13–18, Aug. 1999. [2] S. Haykin, “Cognitive radio: brain-empowered wireless communications,” IEEE Journal on Selected Areas in Communications, vol. 23, no. 2, pp. 201–220, Feb. 2005. [3] S. Xu, Y. Shang, and H. Wang, “Svd based sensing of a wireless microphone signal in cognitive radio networks,” in 11th IEEE Singapore International Conference on Communication Systems, 2008 (ICCS 2008), 2008, pp. 222 –226. [4] T. Yucek and H. Arslan, “A survey of spectrum sensing algorithms for cognitive radio applications,” Communications Surveys Tutorials, IEEE, vol. 11, no. 1, pp. 116 –130, 2009. [5] I. F. Akyildiz, W.-Y. Lee, M. C. Vuran, and S. Mohanty, “NeXt generation/dynamic spectrum access/cognitive radio wireless networks: a survey,” Comput. Netw., vol. 50, no. 13, pp. 2127–2159, 2006 [6] A. Kortun, T. Ratnarajah, M. Sellathurai, and C. Zhong, “On the performance of eigenvalue-based spectrum sensing for cognitive radio,” in New Frontiers in Dynamic Spectrum, 2010 IEEE Symposium on, 2010, pp. 1 –6. [7] S. Leach, “Singular value decomposition – a primer,” Solutions, p. 8, 2000. [Online]. Available:http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2. 6587 [8] Holland, J. 1975. Adaptation in Natural and Artificial Systems. University of Michigan Press [9] Beibei Wang and K. J. Ray Liu, “Advances in Cognitive Radio Networks: A Survey,” in IEEE journal of selected topics in signal processing,vol.5,no.1,February 2011,pp.5-23. [10] A. Sahai and D. Cabric, “Spectrum sensing: Fundamental limits and practical challenges,” in IEEE International Symposium on New Frontiers Dynamic Spectrum Access Networks (DySPAN), November 2005, Baltimore, MD. [11] D. Tufts and R. Kumaresan, “Singular value decomposition and improved frequency estimation using linear prediction,” Acoustics, Speech and Signal Processing, IEEE Transactions on, vol. 30, no. 4, pp. 671 – 675, Aug.. [12] 1982Y. Zeng and Y.-C. Liang, “Maximum-minimum eigenvalue detection for cognitive radio,” in IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications PIMRC 2007., 2007, pp. 1 –5 [13] Sapna Katiyar, A Comparative Study of Genetic Algorithm and the Particle Swarm Optimization,” A.B.E.S. Institute of Technology, Ghaziabad [14] I. M. Johnstone, “On the distribution of the largest eigenvalue in principal components analysis,” Annals of Statistics, vol. 29, no. 2, pp. 295–327, 2001. [15] C. A. Tracy and H. Widom, The distribution of the largest eigenvalue in the Gaussian ensembles, ser. CRM Series in Mathematical Physics 4. New York: Springer-Verlag, 2000, pp. 641–472.