SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
Journal of Information Engineering and Applications                                            www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.3, 2011



       Performance Evaluation of Maximal Ratio Receiver
     Combining Diversity with Prime Interleaver for Iterative
                        IDMA Receiver
                                 M. Shukla1* Akanksha Gupta2 Rinkoo Bhatia 3
    6.   Department of Electronics Engineering, Harcourt Butler Technological Institute, Kanpur, India
    7.   Department of Electronics & Communication Engineering, I.T.M. University, Gwalior, India
    * E-mail of the corresponding author: manojkrshukla@gmail.com


Abstract
The antenna diversity mechanism is established as the well known mechanism for reduction of probability
of occurrence of communication failures (outages) caused by fades. In receiver diversity, multiple antennas
are employed at the receiver side in case of transmitter diversity, multiple antennas are the integral part of
transmitter section.. In this paper, Maximal Ratio Receiver Combining (MRRC) diversity technique is
evaluated to mitigate the effect of fading in IDMA scheme employing random interleaver and prime
interleaver with single transmit two receiving antennas in low rate coded environment. For the performance
evaluation, channel is assumed to be Rayleigh multipath channel with BPSK modulation. Simulation
results demonstrate the significant improvement in BER performance of IDMA with maximal ratio receiver
combining (MRRC) diversity along with prime interleaver and random interleaver and it has also been
observed that BER performance of prime interleaver is similar to that of random interleaver with reduced
bandwidth and memory requirement at transmitter and receiver side.

Keywords: Multipath Fading, MRRC diversity, Multi user detection, Interleave-Division Multiple Access
(IDMA) Scheme, Random Interleaver, Prime Interleaver

1. Introduction
Based on the developing trends of mobile communication, the goal of next generation is to attain broader
bandwidth, higher data rate, and smoother and quicker handoff. Researchers are required to focus on
ensuring seamless service across a multitude of wireless systems and networks The Next generation mobile
communication system will be able to provide a complete solution where voice, data and streamed
multimedia can be given to users on an "Anytime, Anywhere" basis, and at higher data rates than previous
generations. It will be a major move toward ever-present communications systems and seamless high-
quality communication services. The technology required to allow a very simple chip-by-chip (CBC)
iterative multiuser detection strategy to deal with challenges to make these services available is commonly
known as the Third generation (3G) Cellular Systems using multiuser detection [Shukla 2006]. Wireless
communication systems performance is limited by much impairment such as the thermal noise, the path
loss in power as the radio signal propagates the shadowing due to the presence of fixed obstacles in the
radio path, and the fading which combines the effect of multiple propagation paths, and the rapid
movement of mobile units’ reflectors [Wang 2006]. Leading the signal transmission, different signal copies
undergo different attenuation, distortion, delays and phase shifts. Due to this problem overall system
performance severely degraded.
So, this is necessary to reduce the problem of multi- path fading, but not at the cost of extra power or
additional bandwidth. One effective solution is the proposed named space diversity (based on orthogonal
design) to combat the effect of multi path fading and improve coverage, capacity and reliability, without the
requirement of power or extra bandwidth. The most commonly used Space diversity method used with
IDMA is the maximal ratio receiver combining (MRRC) diversity technique, with one transmits and two

29 | P a g e
www.iiste.org
Journal of Information Engineering and Applications                                          www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.3, 2011


received antennas[Shukla 2009], where several uncorrelated replicas of the signals are combined at the
receiver in order to improve the signal reconstruction. Ref. [Ping 2006] Studied a chip interleaved CDMA
scheme and a maximal-ratio-combining (MRC) technique for multiple access channels (MACs) with inter
symbol interference (ISI). It clearly demonstrated the advantages of introducing chip-level interleaver In
IDMA scheme, a chip level interleaver is followed by spreading process inherits many advantages from
conventional CDMA scheme, as it allows a low complexity multiple user detection (MUD) techniques
[Ping 2006] applicable to systems with large numbers of users in multi-path channels and robustness
against fading. The MRRC diversity technique, with one transmits and two receive antennas, is
implemented with interleave-division multiple access.
This paper demonstrates the analysis of IDMA scheme with MRRC diversity at the receiver end to
overcome the effect of fading. During the performance analysis of MRC diversity technique, the
enhancement in the bit error rate (BER) performance of IDMA scheme has been observed and the
performance of IDMA systems with Prime interleaver is found to be similar to that with random
interleavers. The paper is structured as follows. Section II introduces the system model of IDMA scheme
and introduction about random and proposed prime interleaver. maximal ratio receiver combining (MMRC)
is presented in Section III. Section IV shows the performance analysis of proposed interleaver scheme.
Finally, Section V presents the conclusion.

2. Interleave-Division Multiple-Access (IDMA) Scheme
It is well investigated by researchers that the performance of conventional Code-Division Multiple-Access
(CDMA) systems [Liu 2006] is mainly limited by multiple access interference (MAI), as well as
intersymbol interference (ISI). Also, the complexity of CDMA multi-user detection has always been a
serious problem for researchers all over the world. The problem can be visualized from the angle of
computational cost as well complexity of multi-user detection algorithms in CDMA systems. The use of
user-specific signature sequences is a characteristic feature for a conventional CDMA system. The
possibility of employing interleaving for user separation in CDMA systems is briefly inducted in [1] but the
receiver complexity is considered as a main problem. In interleave-division multiple-access (IDMA)
scheme, users are distinguished by user specific chip-level interleavers instead of signatures as in a
conventional CDMA system. The scheme considered is a special case of CDMA in which bandwidth
expansion is entirely performed by low-rate coding. This scheme allows a low complexity multiple user
detection techniques applicable to systems with large numbers of users in multipath channels in addition to
other advantages.
In CDMA scheme, signature sequences are used for user separation while in IDMA scheme, every user is
separated with user-specific interleavers, which are orthogonal in nature. The block diagram of IDMA
scheme is shown in figure 1 for K users. The principle of iterative multi user detection (MUD) which is a
promising technique for multiple access problems (MAI) is also illustrated in the lower part of Fig. 1. The
turbo processor involves elementary signal estimator block (ESEB) and a bank of K decoders (SDECs).
The ESEB partially resolves MAI without considering FEC coding. The outputs of the ESEB are then
passed to the SDECs for further refinement using the FEC coding constraint through de-interleaving block.
The SDECs outputs are fed back to the ESEB to improve its estimates in the next iteration with proper user
specific interleaving. This iterative procedure is repeated a preset number of times (or terminated if a
certain stopping criterion is fulfilled). After the final iteration, the SDECs produce hard decisions on the
information bits [Ping 2006, Wu 2006].
The complexity involved (mainly for solving a size KxK correlation matrix) is O(K2) per user by the well-
known iterative minimum mean square error (MMSE) technique in CDMA, while in IDMA, it is
independent of user. This can be a major benefit when K is large [Shukla 2009].


2.1 IDMA Scheme Model
Here, we consider an IDMA system [Ping 2006], shown in Figure 1, with K simultaneous users using a
30 | P a g e
www.iiste.org
Journal of Information Engineering and Applications                                                          www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.3, 2011


single path channel. At the transmitter, a N-length input data sequence d k= [d k (1), ………, d k (i) , … d k
(N) ]T of user k is encoded into chips ck= [c k (1), ………, c k (j) , … c k (J) ]T based on low rate code C,
where J is the Chip length.
The chips c k is interleaved by a chip level interleaver ‘Πk’, producing a transmitted chip sequence x k= [x k
(1), ……,x k (j) , … x k (J) ]T . After transmitting through the channel, the bits are seen at the receiver side
as r = [r k (1), ……,r k (j) , … r k (J) ]T . The Channel opted is additive white Gaussian noise (AWGN)
channel, for simulation purpose.
In receiver section, after chip matched filtering,Kthe received signal form the K users can be written as
                                          r( j) = ∑hk xk ( j) + n( j), j =1,2,.......J.                                (1)
                                                       thk =1
where h k is the channel coefficient for k user and { n( j ) } are the samples of an additive white
Gaussian noise (AWGN) process with mean as zero and variance σ 2 =N0 / 2. An assumption is made that
{h k} are known priori at the receiver.
The receiver consists of a elementary signal estimator block (ESEB) and a bank of K single user a
posteriori probability (APP) decoders (SDECs), operating in an iterative manner. The modulation technique
used for simulation is binary phase shift keying (BPSK) signaling. The outputs of the ESEB and SDECs are
extrinsic log-likelihood ratios (LLRs) about {x k} defined as

                                                             p( y / xk ( j) = +1) 
                                           e(xk ( j)) = log                        , ∀k, j.                          (2)
                                                             p( y / xk ( j) = −1) 
2.2 LLR Generation
These LLRs are further distinguished by the subscripts i.e., eESEB ( xk ( j )) and eSDEC ( xk ( j )) , depending
upon whether they are generated by ESEB or SDECs. Due to the use random interleavers {Π k}, the ESEB
operation can be carried out in a chip-by-chip manner, with only one sample r(j) used at a time. So,
rewriting (2) as
                                         r ( j ) = hk x k ( j ) + ζ k ( j )                                            (3)
where
                                              ζ k ( j ) = r ( j ) − hk xk ( j ) = ∑ hk xk ( j ) + n( j )
                                                                                              '   '
                                                                                                                  (4)
is the distortion in r( j) with respect to user-k. ξ k ( j ) is the distortion (including interference-plus-noise) in
                                                                                  k ≠k   '



received signal with respect to user-k.
A brief description of CBC algorithm [1] used in IDMA, has been presented in [3]. The operations of ESEB
and APP decoding are carried out user-by-user.
The outputs of the ESEB as extrinsic log-likelihood ratios (LLRs) is given as,
                                                                r ( j ) − E ( r ( j )) + hk E ( x k ( j ))
                                e ESEB ( x k ( j )) = 2 hk .
                                                                 Var ( r j ) − hk Var ( x k ( j ))
                                                                                     2



The LLR output of SDEC is given as,
                                                 S
                      eSDEC ( xk (π ( j ))) = ∑ eESEB ( x k (π ( j )))               j = 1,..., S
                                                j =1

Now, these steps are repeated depending on no. of iterations and users.



31 | P a g e
www.iiste.org
Journal of Information Engineering and Applications                                            www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.3, 2011


3. Various Interleavers for IDMA Scheme
Interleaving is a process of rearranging the ordering of a data sequence in a one to one deterministic format.
Interleaving is a practical technique to enhance the error correcting capability of coding. In turbo coding,
interleaving is used before the information data is encoded by the second component encoder. The basic
role of an interleaver is to construct a long block code from small memory convolutional codes, as long
codes can approach the Shannon capacity limit. Secondly, it spreads out burst errors [Ping 2004, Ping
2004]. The interleaver provides scrambled information data to the second component encoder and
decorrelates inputs to the two component decoders so that an iterative suboptimum-decoding algorithm
based on uncorrelated information exchange between the two component decoders can be applied. The
final role of the interleaver is to break low weight input sequences, and hence increase the code free
Hamming distance or reduce the number of codewords with small distances in the code distance spectrum.
The size and structure of interleavers play a major role in the performance of turbo codes. There are a
number of interleavers, which can be implemented.

a) Random Interleavers:
The user specific Random Interleaver rearranges the elements of its input vector using a random
permutation [Ping 2006]. The incoming data is rearranged using a series of generated permuter indices. A
permuter is essentially a device that generates pseudo-random permutation of given memory addresses. The
data is arranged according to the pseudo-random order of memory addresses. If random interleavers are
employed for the purpose of user separation, then lot of memory space will be required at the transmitter
and receiver ends for the purpose of their storage. Also, considerable amount of bandwidth will be
consumed for transmission of all these interleaver as well as computational complexity will be increase at
receiver ends.

b) Prime Interleavers:
Prime interleaver is based on prime number which gives a novel user-specific interleaver generation
mechanism with lesser time to get it generated and along with minimal consumption of bandwidth required
during transmission well similar performance in terms of BER to that of random interleaver. In generation
of prime interleaver we have used the prime numbers as seed of interleaver. Here, user-specific seeds are
assigned to different users. For understanding the mechanism of prime interleaver, let us consider a case of
interleaving n bits with seed p. First, we consider a Galois field GF (n). Now, the bits are interleaved with a
distance of seed over GF (n) [Shukla 2010].
In case, if {1, 2, 3, 5, 6, 7, 8… n} are consecutive bits to be interleaved with seed p then location of bits
after interleaving will be as follows:
In generation of prime interleaver we have used the prime numbers as seed of interleaver. Different seeds
are assigned to different users. Consider a case of interleaving n bits with seed p.
First consider a gallois field GF(n), now interleave bits with a distance of seed over the GF(n). That is
If{1,2,3,5,6,7,8,…………,n} are consecutive bits these are to be interleaved with seed p
Then
Location of bits after interleaving will be as fallows
1===> 1
2===> (1+p) mod n
3===> (1+2p) mod n
4===> (1+3p) mod n
.          .
.          .
.          .
n===> (1+(n-1)p) mod n
for Example if we have to interleave 8 bits such that {1,2,3,4,5,6,7,8} and we wish to interleave these bits
with seed 3 then the new location of bit will be as fallows
32 | P a g e
www.iiste.org
Journal of Information Engineering and Applications                                         www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.3, 2011


1===> 1
2===> (1+1*3) mod 3===>4
3===> (1+2*3) mod 3===>7
4===> (1+3*3) mod 3===>2
5===> (1+4*3) mod 3===>5
6===> (1+5*3) mod 3===>8
7===> (1+6*3) mod 3===>3
8===> (1+7*3) mod 3===>6
So new order of bits will be{1,4,7,2,5,8,3,6}.
The memory required by the Prime Interleaver is smaller then other available interleavers as now only seed
is to be transmitted. The prime interleaving scheme reduces the bandwidth requirement that occurs in other
available interleaving scheme. It is shown by the help of a comparison table 1.
The bandwidth required by the Prime Interleaver (PI) is smaller than other available interleavers as now
only seed is to be transmitted, in addition to very small amount of memory required at the transmitter and
receiver side as well this scheme reduces the computational complexity that occurs in random interleaving
scheme.


3. Maximal Ratio Receiver Combining (MRRC) Technique
The block diagram of maximal ratio combining (MRC) diversity also referred as Maximal Ratio Receiver
Combining (MRRC) diversity technique with IDMA scheme is shown in figure 2. In this method, the
diversity branches are weighted for maximum SNR. As shown in block diagram in figure 2, d is data of
                                                                                             k
kth user, after encoding and spreading the data is randomly interleaved and termed as ‘chips’. Now this
chip Signal xk is sent from the transmit antenna, which will propagate from both the channel [Shukla
2009].
If we consider 1 transmit and 2 receive antenna, then channel between transmit antenna and the first
received antenna is h0 and between the transmit antenna and second receive antenna one is denoted by h1.
The channel can be modeled having magnitude and phase response. So,
                h0 = α 0 e
                             iθ 0


                                                             h1 = α 1 e
                                                                          iθ 1
                                                                                                        (5)
Noise can be added at both the receiver. The resulting received signals are
                R0=h0xk+n0
                                                              R1=h1xk+n1                                (6)
where n0 and n1 represents the noise and interference at both the receiver separately.
 Now the Receiver combining scheme for two branches MRRC can be written as
                                                         Χ K=h0 ∗ R0 + h1 ∗ R1                          (7)
Now this output of maximal ratio combiner can fed to the detector for the proper estimation of
transmitted signal xk.

4. PERFORMANCE ANALYSIS OF PROPOSED SCHEME
For performance evaluation of IDMA scheme with MRRC diversity, it is assumed that there is no adjacent-
channel and co-channel interference i.e. the simulation is performed in single cell architecture. Also, the
mobility of the user in the cell is assumed to be negligible.
Figure 3 and Table-1 demonstrates the bandwidth requirement of random, tree based and prime interleaver.
The bandwidth required by the Prime Interleaver (PI) is smaller than other available interleavers as now
only seed is to be transmitted, in addition to very small amount of memory required at the transmitter and
receiver side. In Figure3.for the simulation purpose, the data length is opted to be 512 bits while 16. The
33 | P a g e
www.iiste.org
Journal of Information Engineering and Applications                                        www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.3, 2011


iteration at the receiver is chosen to be 15. The simulation has been performed for 100 users.
Now, we present simulation results to demonstrate the performance of the MRRC diversity scheme with
IDMA systems along with random and prime interleavers. Here we refer, that the channel is a flat fading
Rayleigh multipath channel and the modulation is BPSK. The simulations are performed for one transmitter
and two receiver arrangement.
Figure 4 demonstrates the performance of IDMA scheme with rate ½ FEC convolutional coding using
prime interleaver. Here two branches maximal ratio combining scheme is used for implementation of
diversity technique. The performance with MRRC diversity along with FEC coding outperforms the other
simulations. The block length is 2000, data length is 1024 bit/user with spread length to be 16 and number
of iterations used are 15.
Figure. 5 shows the BER performance of IDMA scheme with both random interleaver [3] and prime
interleaver with MRRC diversity with rate ½ FEC convolutional coding. From this figure we can see that
the performance with coding MRRC diversity is far better than that without coding MRRC diversity also
the BER performance of prime interleaver with MRRC diversity comes out similar to that of BER
performance of random interleaver with MRRC diversity.

5. Conclusion
This paper demonstrates the analysis of IDMA scheme with maximal ratio receiver combining (MRRC)
diversity at receiver end to overcome the effect of fading. During the performance analysis of MRRC
diversity technique, the enhancement in the BER performance of IDMA scheme with coding MRRC
diversity has been observed better than that of without coding MRRC diversity and the performance of
IDMA systems with MRRC diversity along with Prime interleavers is found similar to that of random
interleavers. Due to the advantages of same BER performance, smaller bandwidth and memory
requirement, the prime interleaver can take place of the random interleaver without performance loss.

References
Ping L. & Lihai L. (2004), “Analysis and Design of IDMA Systems Based on SNR Evolution and Power
Allocation”, Proceedings of Vehicular Technology Conference VTC 2004-Fall, IEEE, 1068-1072.
Wang P., Ping L. & Liu L. (2006), “Power Allocation for Multiple Access Systems with Practical Coding
and Iterative Multi-User Detection”, Proceedings of International Conference ICC`06, 11, IEEE, 4971-
4976.
Shukla M., Srivastava V.K. & Tiwari S. (2009), “Analysis and Design of Optimum Interleaver for Iterative
Receivers in IDMA Scheme”, Journal of Wireless Communication and Mobile Computing, 9(10), Wiley
1312-1317.
Shukla M., Shukla A., Kumar R., Srivastava V.K., & Tiwari S. (2009) “Simple Diversity Scheme for
IDMA Communication System,” Proceedings of International Journal of Applied Engineering Research,
4(6), 2009, RI Publications, 877-883.
Shukla M., Srivastava V.K. & Tiwari S. (2006), “Interleave Division Multiple Access for Wireless
Communication”, Proceedings of International Conference on Next Generation Communication Systems:
A Perspective’, “ICONGENCOM 06”, J.K. Institute, Allahabad, India, 150-154.
Shukla M., Srivastava V.K. & Tiwari S. (2008), “Analysis and Design of Tree Based Interleaver for
Multiuser Receivers in IDMA Scheme”, Proceedings of International Conference on Networks “ICON
2008”, Delhi, India, IEEE, 1-4.
Wu H., Ping L. & Perotti A. (2006), “User-specific chip-level interleavers design for IDMA system”, Elec.
Letters, 42( 4), IEEE .
Shukla M., Shukla A., Srivastava V.K., & Tiwari S. (2009), “Performance Evaluation of MRC Diversity
Scheme for Iterative IDMA Receivers ”, Proceedings of India Conference “INDICON-09”, Gandhinagar,
Gujarat, India, IEEE, 1-4.
34 | P a g e
www.iiste.org
Journal of Information Engineering and Applications                                         www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.3, 2011


Ping L., Wu Y. & Leung W. (2006),”Interleave-Division Multiple-Access”, Trans. on Wireless
Communication, 5 (4), IEEE. 938-947.
Shukla M., Shukla A., Srivastava V.K., & Tiwari S. (2009), “Different Designing Factors for IDMA
Systems”, Proceedings of International Conference on Computer, Communication, and Control and
Information Technology “C3 IT 2009”, Calcutta, India, Academy Publishers, 748-756.
Shukla M., Srivastava V.K. & Tiwari S. (2006), “A Novel Interleaver for Interleave Division Multiple
Access Scheme”, Proceedings of International Conference on Information and Communication Techniques
“ICCT 07”, Dehradun, India, 843-846.
Shukla M., Srivastava V.K. & Tiwari S. (2009), “Analysis of Optimum Interleaver for Iterative Receivers in
IDMA Scheme”, Proceedings of International Conference on Computing and Networking “ICDCN 2009”,
Springer, 400-407.
Liu L., Tong J. & Ping L. (2006), “Analysis and Optimization of CDMA Systems with Chip-Level
Interleavers”, Journal Selected Areas in Communication, 24, IEEE, 141-150.


Akanksha Gupta is engaged in studies of M. Tech. in I.T.M. University, Gwalior, India and is working in
the area Ad-Hoc Neworks, Multiple Access Scheme and Modulation Schemes.


Rinkoo Bhatia is associated with I.T.M. University, Gwalior, India as Associate Professor in Electronics &
Communication Engineering Department. At present she is working in the area of Cooperative
Communication, Ad-Hoc Networks, routing algorithms, and Mobile Computing mechanisms. She has
published several papers in national and international conferences of repute apart from various journal
publications. She is also member of various professional bodies and is active in research areas.


M. Shukla is associate professor of Electronics Engineering Department in Harcourt Butler Technological
Institute, Kanpur, India. As an engineer-scientist-turned-faculty, Dr. Shukla’s research agenda has been
extensive, ranging from information systems development to case-driven strategic technological issues. His
current research interests include network security, neural network and fuzzy applications in electronics
engineering, design and analysis of interleavers for multiple access schemes in wireless and mobile networks,
channel coding, QOS issues, VHDL coding of communication models, and next generation networks. He has
more than eighteen years of teaching and research experience in the area of circuit design and
Communication Engineering. He has supervised a number of M. Tech. theses. He has worked as reviewer for
several conferences and journals of repute. He has published more than fifteen research papers in different
journals and conferences. Dr. Shukla’s papers have appeared in journals such as Wiley Transactions on
Wireless Communication and Mobile Computing, International Journal of Applied Engineering Research, The
IUP Journal of Telecommunications, and Springer Lecture Notes on Computer Science, among others. He is a
member of the Institute of Electrical and Electronics Engineers (IEEE), Institution of Electronic and
Telecommunication Engineers (IETE), International Society of Electronics & Electrical Engineers (ISEEE),
and the Indian Society for Technical Education (ISTE). He may be ‘virtually’ reached at
http://www.hbti.ac.in/Dept/ET/manoj.htm and http://www.manojkrshukla.weebly.com.




35 | P a g e
www.iiste.org
Journal of Information Engineering and Applications                                    www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.3, 2011




   Figure 1.        Transmitter and Receiver structures of IDMA scheme with K simultaneous users.




36 | P a g e
www.iiste.org
Journal of Information Engineering and Applications                                                                                                                            www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.3, 2011


        Figure 2.                                                                              IDMA with proposed two branches MRRC diversity scheme for kth user

                                                                                      6
                                                                                 x 10            Comparison Graph showing Bandwidth Requirement of 4 Interleavers
                                                                            5
                                                                                                                              Bandwidh requirement of Random Interleaver
                                                                                                                              Bandwidth requirement of Master Random Interleaver
                                                                           4.5
                                                                                                                              Bandwidth requirement of Tree Based Interleaver
          Bandwidth Requirement of Interleaver(No.of bits required/user)




                                                                                                                              Bandwidth requirement of Prime Interleaver
                                                                            4


                                                                           3.5


                                                                            3


                                                                           2.5


                                                                            2


                                                                           1.5


                                                                            1


                                                                           0.5


                                                                            0
                                                                                 0        10       20       30        40        50       60        70        80       90           100
                                                                                                                           User Number




                                                                                     Figure3. Comparison of Bandwidth requirement of various interleavers




37 | P a g e
www.iiste.org
Journal of Information Engineering and Applications                                                               www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.3, 2011



                                  -1
                                 10
                                                                       with MRC diversity with coding PI
                                                                       with MRC diversity without coding PI
                                                                       with coding without diversity PI
                                  -2
                                                                       without coding no diversity PI
                                 10




                                  -3
                                 10
          B it E rro r R a t e




                                  -4
                                 10




                                  -5
                                 10




                                  -6
                                 10




                                  -7
                                 10
                                       1   2   3   4           5   6                7                         8
                                                       Eb/No




   Figure 4. Performance comparison of uncoded and coded IDMA with Prime Interleaver with MRRC
                                              diversity




38 | P a g e
www.iiste.org
Journal of Information Engineering and Applications                                                                                     www.iiste.org
ISSN 2224-5758 (print) ISSN 2224-896X (online)
Vol 1, No.3, 2011



                            -1
                       10

                                                                                                  MRC diversity with coding PI
                                                                                                  MRC diversity with coding RI
                            -2                                                                    MRC diversity without coding RI
                       10
                                                                                                  MRC diversity without coding PI




                            -3
                       10
   B it E rror R ate




                            -4
                       10




                            -5
                       10




                            -6
                       10




                            -7
                       10
                                 1          2           3          4               5         6               7                      8
                                                                       Eb/No




Figure 5. Performance comparison random interleaver and Prime Interleaver in uncoded/ coded IDMA with
                                          MRRC diversity

                                     Table1.Comparision of bandwidth requirement for transmission of interleaving mask



                       User Count                Random Interleaver            Tree Based Interleaver            Prime Interleaver

                       2                         2                             0                                 1

                       6                         6                             1                                 1

                       14                        14                            2                                 1

                       30                        30                            3                                 1

                       62                        62                            4                                 1

                       126                       126                           5                                 1




39 | P a g e
www.iiste.org
International Journals Call for Paper
The IISTE, a U.S. publisher, is currently hosting the academic journals listed below. The peer review process of the following journals
usually takes LESS THAN 14 business days and IISTE usually publishes a qualified article within 30 days. Authors should
send their full paper to the following email address. More information can be found in the IISTE website : www.iiste.org

Business, Economics, Finance and Management               PAPER SUBMISSION EMAIL
European Journal of Business and Management               EJBM@iiste.org
Research Journal of Finance and Accounting                RJFA@iiste.org
Journal of Economics and Sustainable Development          JESD@iiste.org
Information and Knowledge Management                      IKM@iiste.org
Developing Country Studies                                DCS@iiste.org
Industrial Engineering Letters                            IEL@iiste.org


Physical Sciences, Mathematics and Chemistry              PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research                      JNSR@iiste.org
Chemistry and Materials Research                          CMR@iiste.org
Mathematical Theory and Modeling                          MTM@iiste.org
Advances in Physics Theories and Applications             APTA@iiste.org
Chemical and Process Engineering Research                 CPER@iiste.org


Engineering, Technology and Systems                       PAPER SUBMISSION EMAIL
Computer Engineering and Intelligent Systems              CEIS@iiste.org
Innovative Systems Design and Engineering                 ISDE@iiste.org
Journal of Energy Technologies and Policy                 JETP@iiste.org
Information and Knowledge Management                      IKM@iiste.org
Control Theory and Informatics                            CTI@iiste.org
Journal of Information Engineering and Applications       JIEA@iiste.org
Industrial Engineering Letters                            IEL@iiste.org
Network and Complex Systems                               NCS@iiste.org


Environment, Civil, Materials Sciences                    PAPER SUBMISSION EMAIL
Journal of Environment and Earth Science                  JEES@iiste.org
Civil and Environmental Research                          CER@iiste.org
Journal of Natural Sciences Research                      JNSR@iiste.org
Civil and Environmental Research                          CER@iiste.org


Life Science, Food and Medical Sciences                   PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research                      JNSR@iiste.org
Journal of Biology, Agriculture and Healthcare            JBAH@iiste.org
Food Science and Quality Management                       FSQM@iiste.org
Chemistry and Materials Research                          CMR@iiste.org


Education, and other Social Sciences                      PAPER SUBMISSION EMAIL
Journal of Education and Practice                         JEP@iiste.org
Journal of Law, Policy and Globalization                  JLPG@iiste.org                       Global knowledge sharing:
New Media and Mass Communication                          NMMC@iiste.org                       EBSCO, Index Copernicus, Ulrich's
Journal of Energy Technologies and Policy                 JETP@iiste.org                       Periodicals Directory, JournalTOCS, PKP
Historical Research Letter                                HRL@iiste.org                        Open Archives Harvester, Bielefeld
                                                                                               Academic Search Engine, Elektronische
Public Policy and Administration Research                 PPAR@iiste.org                       Zeitschriftenbibliothek EZB, Open J-Gate,
International Affairs and Global Strategy                 IAGS@iiste.org                       OCLC WorldCat, Universe Digtial Library ,
Research on Humanities and Social Sciences                RHSS@iiste.org                       NewJour, Google Scholar.

Developing Country Studies                                DCS@iiste.org                        IISTE is member of CrossRef. All journals
Arts and Design Studies                                   ADS@iiste.org                        have high IC Impact Factor Values (ICV).

Contenu connexe

Tendances

Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...eSAT Journals
 
ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK
ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK
ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK IJCNCJournal
 
Estimating cellphone signal intensity & identifying radiation hotspot are...
Estimating cellphone signal intensity & identifying radiation hotspot are...Estimating cellphone signal intensity & identifying radiation hotspot are...
Estimating cellphone signal intensity & identifying radiation hotspot are...eSAT Journals
 
Beam division multiple access for millimeter wave massive MIMO: Hybrid zero-f...
Beam division multiple access for millimeter wave massive MIMO: Hybrid zero-f...Beam division multiple access for millimeter wave massive MIMO: Hybrid zero-f...
Beam division multiple access for millimeter wave massive MIMO: Hybrid zero-f...IJECEIAES
 
Mobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio NetworksMobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio Networksszhb
 
Proposed Model for Interference Estimation in Code Division Multiple Access
Proposed Model for Interference Estimation in Code Division Multiple AccessProposed Model for Interference Estimation in Code Division Multiple Access
Proposed Model for Interference Estimation in Code Division Multiple AccessTELKOMNIKA JOURNAL
 
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...Cemal Ardil
 
DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS
DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS
DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS pijans
 
Mitigation of packet loss with end-to-end delay in wireless body area network...
Mitigation of packet loss with end-to-end delay in wireless body area network...Mitigation of packet loss with end-to-end delay in wireless body area network...
Mitigation of packet loss with end-to-end delay in wireless body area network...IJECEIAES
 
Performance of dsdv protocol based on different propagation model with vari
Performance of dsdv protocol based on different propagation model with variPerformance of dsdv protocol based on different propagation model with vari
Performance of dsdv protocol based on different propagation model with variIAEME Publication
 
Performance analysis for Adaptive Subcarriers Allocation in Coherent Optical ...
Performance analysis for Adaptive Subcarriers Allocation in Coherent Optical ...Performance analysis for Adaptive Subcarriers Allocation in Coherent Optical ...
Performance analysis for Adaptive Subcarriers Allocation in Coherent Optical ...iosrjce
 
A survey on incremental relaying protocols in cooperative communication
A survey on incremental relaying protocols in cooperative communicationA survey on incremental relaying protocols in cooperative communication
A survey on incremental relaying protocols in cooperative communicationeSAT Publishing House
 
Simulation of Few Mode Fiber Communication System Using Adaptive Recursive le...
Simulation of Few Mode Fiber Communication System Using Adaptive Recursive le...Simulation of Few Mode Fiber Communication System Using Adaptive Recursive le...
Simulation of Few Mode Fiber Communication System Using Adaptive Recursive le...rahulmonikasharma
 
Paper id 252014136
Paper id 252014136Paper id 252014136
Paper id 252014136IJRAT
 
Performance Analysis of A Ds-Cdma System by using Rayleigh and Nakagami-M Fad...
Performance Analysis of A Ds-Cdma System by using Rayleigh and Nakagami-M Fad...Performance Analysis of A Ds-Cdma System by using Rayleigh and Nakagami-M Fad...
Performance Analysis of A Ds-Cdma System by using Rayleigh and Nakagami-M Fad...IRJET Journal
 
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...pijans
 
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...iosrjce
 

Tendances (19)

Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
Estimation and design of mc ds-cdma for hybrid concatenated coding in high sp...
 
ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK
ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK
ADAPTIVE SENSOR SENSING RANGE TO MAXIMISE LIFETIME OF WIRELESS SENSOR NETWORK
 
Estimating cellphone signal intensity & identifying radiation hotspot are...
Estimating cellphone signal intensity & identifying radiation hotspot are...Estimating cellphone signal intensity & identifying radiation hotspot are...
Estimating cellphone signal intensity & identifying radiation hotspot are...
 
D010231821
D010231821D010231821
D010231821
 
Beam division multiple access for millimeter wave massive MIMO: Hybrid zero-f...
Beam division multiple access for millimeter wave massive MIMO: Hybrid zero-f...Beam division multiple access for millimeter wave massive MIMO: Hybrid zero-f...
Beam division multiple access for millimeter wave massive MIMO: Hybrid zero-f...
 
Mobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio NetworksMobility and Propagation Models in Multi-hop Cognitive Radio Networks
Mobility and Propagation Models in Multi-hop Cognitive Radio Networks
 
Proposed Model for Interference Estimation in Code Division Multiple Access
Proposed Model for Interference Estimation in Code Division Multiple AccessProposed Model for Interference Estimation in Code Division Multiple Access
Proposed Model for Interference Estimation in Code Division Multiple Access
 
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
 
DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS
DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS
DESIGN OF A COMPACT CIRCULAR MICROSTRIP PATCH ANTENNA FOR WLAN APPLICATIONS
 
Mitigation of packet loss with end-to-end delay in wireless body area network...
Mitigation of packet loss with end-to-end delay in wireless body area network...Mitigation of packet loss with end-to-end delay in wireless body area network...
Mitigation of packet loss with end-to-end delay in wireless body area network...
 
Performance of dsdv protocol based on different propagation model with vari
Performance of dsdv protocol based on different propagation model with variPerformance of dsdv protocol based on different propagation model with vari
Performance of dsdv protocol based on different propagation model with vari
 
Performance analysis for Adaptive Subcarriers Allocation in Coherent Optical ...
Performance analysis for Adaptive Subcarriers Allocation in Coherent Optical ...Performance analysis for Adaptive Subcarriers Allocation in Coherent Optical ...
Performance analysis for Adaptive Subcarriers Allocation in Coherent Optical ...
 
A survey on incremental relaying protocols in cooperative communication
A survey on incremental relaying protocols in cooperative communicationA survey on incremental relaying protocols in cooperative communication
A survey on incremental relaying protocols in cooperative communication
 
I010614347
I010614347I010614347
I010614347
 
Simulation of Few Mode Fiber Communication System Using Adaptive Recursive le...
Simulation of Few Mode Fiber Communication System Using Adaptive Recursive le...Simulation of Few Mode Fiber Communication System Using Adaptive Recursive le...
Simulation of Few Mode Fiber Communication System Using Adaptive Recursive le...
 
Paper id 252014136
Paper id 252014136Paper id 252014136
Paper id 252014136
 
Performance Analysis of A Ds-Cdma System by using Rayleigh and Nakagami-M Fad...
Performance Analysis of A Ds-Cdma System by using Rayleigh and Nakagami-M Fad...Performance Analysis of A Ds-Cdma System by using Rayleigh and Nakagami-M Fad...
Performance Analysis of A Ds-Cdma System by using Rayleigh and Nakagami-M Fad...
 
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
COMPARATIVE PERFORMANCE ASSESSMENT OF VBLAST ENCODED 8×8 MIMO MC-CDMA WIRELES...
 
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...
An Approach to Improve the Quality of Service in OFDMA Relay Networks via Re-...
 

Similaire à 11.performance evaluation of maximal ratio receiver combining diversity with prime interleaver for iterative idma receiver

Application of diversity techniques for multi user idma communication system
Application of diversity techniques for multi user idma communication systemApplication of diversity techniques for multi user idma communication system
Application of diversity techniques for multi user idma communication systemAlexander Decker
 
PERFORMANCE EVALUATION OF MC-CDMA SYSTEM OVER RAYLEIGH FADING CHANNEL
PERFORMANCE EVALUATION OF MC-CDMA SYSTEM OVER RAYLEIGH FADING CHANNELPERFORMANCE EVALUATION OF MC-CDMA SYSTEM OVER RAYLEIGH FADING CHANNEL
PERFORMANCE EVALUATION OF MC-CDMA SYSTEM OVER RAYLEIGH FADING CHANNELIJCSES Journal
 
A New Hybrid Diversity Combining Scheme for Mobile Radio Communication System...
A New Hybrid Diversity Combining Scheme for Mobile Radio Communication System...A New Hybrid Diversity Combining Scheme for Mobile Radio Communication System...
A New Hybrid Diversity Combining Scheme for Mobile Radio Communication System...AIRCC Publishing Corporation
 
A NEW HYBRID DIVERSITY COMBINING SCHEME FOR MOBILE RADIO COMMUNICATION SYSTEM...
A NEW HYBRID DIVERSITY COMBINING SCHEME FOR MOBILE RADIO COMMUNICATION SYSTEM...A NEW HYBRID DIVERSITY COMBINING SCHEME FOR MOBILE RADIO COMMUNICATION SYSTEM...
A NEW HYBRID DIVERSITY COMBINING SCHEME FOR MOBILE RADIO COMMUNICATION SYSTEM...ijcsit
 
Peak to Average Power Ratio Reduction in Mc Cdma System by Using Pulse Shapin...
Peak to Average Power Ratio Reduction in Mc Cdma System by Using Pulse Shapin...Peak to Average Power Ratio Reduction in Mc Cdma System by Using Pulse Shapin...
Peak to Average Power Ratio Reduction in Mc Cdma System by Using Pulse Shapin...IOSR Journals
 
Performance of the MIMO-MC-CDMA System with MMSE Equalization
Performance of the MIMO-MC-CDMA System with MMSE EqualizationPerformance of the MIMO-MC-CDMA System with MMSE Equalization
Performance of the MIMO-MC-CDMA System with MMSE EqualizationTamilarasan N
 
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdm
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdmHybrid ldpc and stbc algorithms to improve ber reduction in ofdm
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdmIAEME Publication
 
DUAL PORT COGNITIVE RADIO ANTENNA USING TUNABLE BAND PASS FILTER
DUAL PORT COGNITIVE RADIO ANTENNA USING TUNABLE BAND PASS FILTERDUAL PORT COGNITIVE RADIO ANTENNA USING TUNABLE BAND PASS FILTER
DUAL PORT COGNITIVE RADIO ANTENNA USING TUNABLE BAND PASS FILTERjmicro
 
Multiuser Detection with Decision-feedback Detectors and PIC in MC-CDMA System
Multiuser Detection with Decision-feedback Detectors and PIC in MC-CDMA SystemMultiuser Detection with Decision-feedback Detectors and PIC in MC-CDMA System
Multiuser Detection with Decision-feedback Detectors and PIC in MC-CDMA SystemTELKOMNIKA JOURNAL
 
BER Performance of MU-MIMO System using Dirty Paper Coding
BER Performance of MU-MIMO System using Dirty Paper CodingBER Performance of MU-MIMO System using Dirty Paper Coding
BER Performance of MU-MIMO System using Dirty Paper CodingIJEEE
 
Estimation of bit error rate in 2×2 and 4×4 multi-input multioutput-orthogon...
Estimation of bit error rate in 2×2 and 4×4 multi-input multioutput-orthogon...Estimation of bit error rate in 2×2 and 4×4 multi-input multioutput-orthogon...
Estimation of bit error rate in 2×2 and 4×4 multi-input multioutput-orthogon...IJECEIAES
 
Performance analysis of adaptive filter channel estimated MIMO OFDM communica...
Performance analysis of adaptive filter channel estimated MIMO OFDM communica...Performance analysis of adaptive filter channel estimated MIMO OFDM communica...
Performance analysis of adaptive filter channel estimated MIMO OFDM communica...IJECEIAES
 
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...IRJET Journal
 
Performance analysis of iterative idma scheme in power line communication usi...
Performance analysis of iterative idma scheme in power line communication usi...Performance analysis of iterative idma scheme in power line communication usi...
Performance analysis of iterative idma scheme in power line communication usi...Alexander Decker
 
Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Editor IJARCET
 
Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Editor IJARCET
 
Multiuser MIMO Channel Estimation
Multiuser MIMO Channel Estimation Multiuser MIMO Channel Estimation
Multiuser MIMO Channel Estimation IJERA Editor
 

Similaire à 11.performance evaluation of maximal ratio receiver combining diversity with prime interleaver for iterative idma receiver (20)

Application of diversity techniques for multi user idma communication system
Application of diversity techniques for multi user idma communication systemApplication of diversity techniques for multi user idma communication system
Application of diversity techniques for multi user idma communication system
 
PERFORMANCE EVALUATION OF MC-CDMA SYSTEM OVER RAYLEIGH FADING CHANNEL
PERFORMANCE EVALUATION OF MC-CDMA SYSTEM OVER RAYLEIGH FADING CHANNELPERFORMANCE EVALUATION OF MC-CDMA SYSTEM OVER RAYLEIGH FADING CHANNEL
PERFORMANCE EVALUATION OF MC-CDMA SYSTEM OVER RAYLEIGH FADING CHANNEL
 
A New Hybrid Diversity Combining Scheme for Mobile Radio Communication System...
A New Hybrid Diversity Combining Scheme for Mobile Radio Communication System...A New Hybrid Diversity Combining Scheme for Mobile Radio Communication System...
A New Hybrid Diversity Combining Scheme for Mobile Radio Communication System...
 
A NEW HYBRID DIVERSITY COMBINING SCHEME FOR MOBILE RADIO COMMUNICATION SYSTEM...
A NEW HYBRID DIVERSITY COMBINING SCHEME FOR MOBILE RADIO COMMUNICATION SYSTEM...A NEW HYBRID DIVERSITY COMBINING SCHEME FOR MOBILE RADIO COMMUNICATION SYSTEM...
A NEW HYBRID DIVERSITY COMBINING SCHEME FOR MOBILE RADIO COMMUNICATION SYSTEM...
 
Peak to Average Power Ratio Reduction in Mc Cdma System by Using Pulse Shapin...
Peak to Average Power Ratio Reduction in Mc Cdma System by Using Pulse Shapin...Peak to Average Power Ratio Reduction in Mc Cdma System by Using Pulse Shapin...
Peak to Average Power Ratio Reduction in Mc Cdma System by Using Pulse Shapin...
 
Performance of the MIMO-MC-CDMA System with MMSE Equalization
Performance of the MIMO-MC-CDMA System with MMSE EqualizationPerformance of the MIMO-MC-CDMA System with MMSE Equalization
Performance of the MIMO-MC-CDMA System with MMSE Equalization
 
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdm
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdmHybrid ldpc and stbc algorithms to improve ber reduction in ofdm
Hybrid ldpc and stbc algorithms to improve ber reduction in ofdm
 
DUAL PORT COGNITIVE RADIO ANTENNA USING TUNABLE BAND PASS FILTER
DUAL PORT COGNITIVE RADIO ANTENNA USING TUNABLE BAND PASS FILTERDUAL PORT COGNITIVE RADIO ANTENNA USING TUNABLE BAND PASS FILTER
DUAL PORT COGNITIVE RADIO ANTENNA USING TUNABLE BAND PASS FILTER
 
Multiuser Detection with Decision-feedback Detectors and PIC in MC-CDMA System
Multiuser Detection with Decision-feedback Detectors and PIC in MC-CDMA SystemMultiuser Detection with Decision-feedback Detectors and PIC in MC-CDMA System
Multiuser Detection with Decision-feedback Detectors and PIC in MC-CDMA System
 
BER Performance of MU-MIMO System using Dirty Paper Coding
BER Performance of MU-MIMO System using Dirty Paper CodingBER Performance of MU-MIMO System using Dirty Paper Coding
BER Performance of MU-MIMO System using Dirty Paper Coding
 
IJET-V3I1P12
IJET-V3I1P12IJET-V3I1P12
IJET-V3I1P12
 
Estimation of bit error rate in 2×2 and 4×4 multi-input multioutput-orthogon...
Estimation of bit error rate in 2×2 and 4×4 multi-input multioutput-orthogon...Estimation of bit error rate in 2×2 and 4×4 multi-input multioutput-orthogon...
Estimation of bit error rate in 2×2 and 4×4 multi-input multioutput-orthogon...
 
Performance analysis of adaptive filter channel estimated MIMO OFDM communica...
Performance analysis of adaptive filter channel estimated MIMO OFDM communica...Performance analysis of adaptive filter channel estimated MIMO OFDM communica...
Performance analysis of adaptive filter channel estimated MIMO OFDM communica...
 
Ic3313881393
Ic3313881393Ic3313881393
Ic3313881393
 
Ic3313881393
Ic3313881393Ic3313881393
Ic3313881393
 
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
 
Performance analysis of iterative idma scheme in power line communication usi...
Performance analysis of iterative idma scheme in power line communication usi...Performance analysis of iterative idma scheme in power line communication usi...
Performance analysis of iterative idma scheme in power line communication usi...
 
Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377
 
Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377
 
Multiuser MIMO Channel Estimation
Multiuser MIMO Channel Estimation Multiuser MIMO Channel Estimation
Multiuser MIMO Channel Estimation
 

Plus de Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

Plus de Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Dernier

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 

11.performance evaluation of maximal ratio receiver combining diversity with prime interleaver for iterative idma receiver

  • 1. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.3, 2011 Performance Evaluation of Maximal Ratio Receiver Combining Diversity with Prime Interleaver for Iterative IDMA Receiver M. Shukla1* Akanksha Gupta2 Rinkoo Bhatia 3 6. Department of Electronics Engineering, Harcourt Butler Technological Institute, Kanpur, India 7. Department of Electronics & Communication Engineering, I.T.M. University, Gwalior, India * E-mail of the corresponding author: manojkrshukla@gmail.com Abstract The antenna diversity mechanism is established as the well known mechanism for reduction of probability of occurrence of communication failures (outages) caused by fades. In receiver diversity, multiple antennas are employed at the receiver side in case of transmitter diversity, multiple antennas are the integral part of transmitter section.. In this paper, Maximal Ratio Receiver Combining (MRRC) diversity technique is evaluated to mitigate the effect of fading in IDMA scheme employing random interleaver and prime interleaver with single transmit two receiving antennas in low rate coded environment. For the performance evaluation, channel is assumed to be Rayleigh multipath channel with BPSK modulation. Simulation results demonstrate the significant improvement in BER performance of IDMA with maximal ratio receiver combining (MRRC) diversity along with prime interleaver and random interleaver and it has also been observed that BER performance of prime interleaver is similar to that of random interleaver with reduced bandwidth and memory requirement at transmitter and receiver side. Keywords: Multipath Fading, MRRC diversity, Multi user detection, Interleave-Division Multiple Access (IDMA) Scheme, Random Interleaver, Prime Interleaver 1. Introduction Based on the developing trends of mobile communication, the goal of next generation is to attain broader bandwidth, higher data rate, and smoother and quicker handoff. Researchers are required to focus on ensuring seamless service across a multitude of wireless systems and networks The Next generation mobile communication system will be able to provide a complete solution where voice, data and streamed multimedia can be given to users on an "Anytime, Anywhere" basis, and at higher data rates than previous generations. It will be a major move toward ever-present communications systems and seamless high- quality communication services. The technology required to allow a very simple chip-by-chip (CBC) iterative multiuser detection strategy to deal with challenges to make these services available is commonly known as the Third generation (3G) Cellular Systems using multiuser detection [Shukla 2006]. Wireless communication systems performance is limited by much impairment such as the thermal noise, the path loss in power as the radio signal propagates the shadowing due to the presence of fixed obstacles in the radio path, and the fading which combines the effect of multiple propagation paths, and the rapid movement of mobile units’ reflectors [Wang 2006]. Leading the signal transmission, different signal copies undergo different attenuation, distortion, delays and phase shifts. Due to this problem overall system performance severely degraded. So, this is necessary to reduce the problem of multi- path fading, but not at the cost of extra power or additional bandwidth. One effective solution is the proposed named space diversity (based on orthogonal design) to combat the effect of multi path fading and improve coverage, capacity and reliability, without the requirement of power or extra bandwidth. The most commonly used Space diversity method used with IDMA is the maximal ratio receiver combining (MRRC) diversity technique, with one transmits and two 29 | P a g e www.iiste.org
  • 2. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.3, 2011 received antennas[Shukla 2009], where several uncorrelated replicas of the signals are combined at the receiver in order to improve the signal reconstruction. Ref. [Ping 2006] Studied a chip interleaved CDMA scheme and a maximal-ratio-combining (MRC) technique for multiple access channels (MACs) with inter symbol interference (ISI). It clearly demonstrated the advantages of introducing chip-level interleaver In IDMA scheme, a chip level interleaver is followed by spreading process inherits many advantages from conventional CDMA scheme, as it allows a low complexity multiple user detection (MUD) techniques [Ping 2006] applicable to systems with large numbers of users in multi-path channels and robustness against fading. The MRRC diversity technique, with one transmits and two receive antennas, is implemented with interleave-division multiple access. This paper demonstrates the analysis of IDMA scheme with MRRC diversity at the receiver end to overcome the effect of fading. During the performance analysis of MRC diversity technique, the enhancement in the bit error rate (BER) performance of IDMA scheme has been observed and the performance of IDMA systems with Prime interleaver is found to be similar to that with random interleavers. The paper is structured as follows. Section II introduces the system model of IDMA scheme and introduction about random and proposed prime interleaver. maximal ratio receiver combining (MMRC) is presented in Section III. Section IV shows the performance analysis of proposed interleaver scheme. Finally, Section V presents the conclusion. 2. Interleave-Division Multiple-Access (IDMA) Scheme It is well investigated by researchers that the performance of conventional Code-Division Multiple-Access (CDMA) systems [Liu 2006] is mainly limited by multiple access interference (MAI), as well as intersymbol interference (ISI). Also, the complexity of CDMA multi-user detection has always been a serious problem for researchers all over the world. The problem can be visualized from the angle of computational cost as well complexity of multi-user detection algorithms in CDMA systems. The use of user-specific signature sequences is a characteristic feature for a conventional CDMA system. The possibility of employing interleaving for user separation in CDMA systems is briefly inducted in [1] but the receiver complexity is considered as a main problem. In interleave-division multiple-access (IDMA) scheme, users are distinguished by user specific chip-level interleavers instead of signatures as in a conventional CDMA system. The scheme considered is a special case of CDMA in which bandwidth expansion is entirely performed by low-rate coding. This scheme allows a low complexity multiple user detection techniques applicable to systems with large numbers of users in multipath channels in addition to other advantages. In CDMA scheme, signature sequences are used for user separation while in IDMA scheme, every user is separated with user-specific interleavers, which are orthogonal in nature. The block diagram of IDMA scheme is shown in figure 1 for K users. The principle of iterative multi user detection (MUD) which is a promising technique for multiple access problems (MAI) is also illustrated in the lower part of Fig. 1. The turbo processor involves elementary signal estimator block (ESEB) and a bank of K decoders (SDECs). The ESEB partially resolves MAI without considering FEC coding. The outputs of the ESEB are then passed to the SDECs for further refinement using the FEC coding constraint through de-interleaving block. The SDECs outputs are fed back to the ESEB to improve its estimates in the next iteration with proper user specific interleaving. This iterative procedure is repeated a preset number of times (or terminated if a certain stopping criterion is fulfilled). After the final iteration, the SDECs produce hard decisions on the information bits [Ping 2006, Wu 2006]. The complexity involved (mainly for solving a size KxK correlation matrix) is O(K2) per user by the well- known iterative minimum mean square error (MMSE) technique in CDMA, while in IDMA, it is independent of user. This can be a major benefit when K is large [Shukla 2009]. 2.1 IDMA Scheme Model Here, we consider an IDMA system [Ping 2006], shown in Figure 1, with K simultaneous users using a 30 | P a g e www.iiste.org
  • 3. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.3, 2011 single path channel. At the transmitter, a N-length input data sequence d k= [d k (1), ………, d k (i) , … d k (N) ]T of user k is encoded into chips ck= [c k (1), ………, c k (j) , … c k (J) ]T based on low rate code C, where J is the Chip length. The chips c k is interleaved by a chip level interleaver ‘Πk’, producing a transmitted chip sequence x k= [x k (1), ……,x k (j) , … x k (J) ]T . After transmitting through the channel, the bits are seen at the receiver side as r = [r k (1), ……,r k (j) , … r k (J) ]T . The Channel opted is additive white Gaussian noise (AWGN) channel, for simulation purpose. In receiver section, after chip matched filtering,Kthe received signal form the K users can be written as r( j) = ∑hk xk ( j) + n( j), j =1,2,.......J. (1) thk =1 where h k is the channel coefficient for k user and { n( j ) } are the samples of an additive white Gaussian noise (AWGN) process with mean as zero and variance σ 2 =N0 / 2. An assumption is made that {h k} are known priori at the receiver. The receiver consists of a elementary signal estimator block (ESEB) and a bank of K single user a posteriori probability (APP) decoders (SDECs), operating in an iterative manner. The modulation technique used for simulation is binary phase shift keying (BPSK) signaling. The outputs of the ESEB and SDECs are extrinsic log-likelihood ratios (LLRs) about {x k} defined as  p( y / xk ( j) = +1)  e(xk ( j)) = log   , ∀k, j. (2)  p( y / xk ( j) = −1)  2.2 LLR Generation These LLRs are further distinguished by the subscripts i.e., eESEB ( xk ( j )) and eSDEC ( xk ( j )) , depending upon whether they are generated by ESEB or SDECs. Due to the use random interleavers {Π k}, the ESEB operation can be carried out in a chip-by-chip manner, with only one sample r(j) used at a time. So, rewriting (2) as r ( j ) = hk x k ( j ) + ζ k ( j ) (3) where ζ k ( j ) = r ( j ) − hk xk ( j ) = ∑ hk xk ( j ) + n( j ) ' ' (4) is the distortion in r( j) with respect to user-k. ξ k ( j ) is the distortion (including interference-plus-noise) in k ≠k ' received signal with respect to user-k. A brief description of CBC algorithm [1] used in IDMA, has been presented in [3]. The operations of ESEB and APP decoding are carried out user-by-user. The outputs of the ESEB as extrinsic log-likelihood ratios (LLRs) is given as, r ( j ) − E ( r ( j )) + hk E ( x k ( j )) e ESEB ( x k ( j )) = 2 hk . Var ( r j ) − hk Var ( x k ( j )) 2 The LLR output of SDEC is given as, S eSDEC ( xk (π ( j ))) = ∑ eESEB ( x k (π ( j ))) j = 1,..., S j =1 Now, these steps are repeated depending on no. of iterations and users. 31 | P a g e www.iiste.org
  • 4. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.3, 2011 3. Various Interleavers for IDMA Scheme Interleaving is a process of rearranging the ordering of a data sequence in a one to one deterministic format. Interleaving is a practical technique to enhance the error correcting capability of coding. In turbo coding, interleaving is used before the information data is encoded by the second component encoder. The basic role of an interleaver is to construct a long block code from small memory convolutional codes, as long codes can approach the Shannon capacity limit. Secondly, it spreads out burst errors [Ping 2004, Ping 2004]. The interleaver provides scrambled information data to the second component encoder and decorrelates inputs to the two component decoders so that an iterative suboptimum-decoding algorithm based on uncorrelated information exchange between the two component decoders can be applied. The final role of the interleaver is to break low weight input sequences, and hence increase the code free Hamming distance or reduce the number of codewords with small distances in the code distance spectrum. The size and structure of interleavers play a major role in the performance of turbo codes. There are a number of interleavers, which can be implemented. a) Random Interleavers: The user specific Random Interleaver rearranges the elements of its input vector using a random permutation [Ping 2006]. The incoming data is rearranged using a series of generated permuter indices. A permuter is essentially a device that generates pseudo-random permutation of given memory addresses. The data is arranged according to the pseudo-random order of memory addresses. If random interleavers are employed for the purpose of user separation, then lot of memory space will be required at the transmitter and receiver ends for the purpose of their storage. Also, considerable amount of bandwidth will be consumed for transmission of all these interleaver as well as computational complexity will be increase at receiver ends. b) Prime Interleavers: Prime interleaver is based on prime number which gives a novel user-specific interleaver generation mechanism with lesser time to get it generated and along with minimal consumption of bandwidth required during transmission well similar performance in terms of BER to that of random interleaver. In generation of prime interleaver we have used the prime numbers as seed of interleaver. Here, user-specific seeds are assigned to different users. For understanding the mechanism of prime interleaver, let us consider a case of interleaving n bits with seed p. First, we consider a Galois field GF (n). Now, the bits are interleaved with a distance of seed over GF (n) [Shukla 2010]. In case, if {1, 2, 3, 5, 6, 7, 8… n} are consecutive bits to be interleaved with seed p then location of bits after interleaving will be as follows: In generation of prime interleaver we have used the prime numbers as seed of interleaver. Different seeds are assigned to different users. Consider a case of interleaving n bits with seed p. First consider a gallois field GF(n), now interleave bits with a distance of seed over the GF(n). That is If{1,2,3,5,6,7,8,…………,n} are consecutive bits these are to be interleaved with seed p Then Location of bits after interleaving will be as fallows 1===> 1 2===> (1+p) mod n 3===> (1+2p) mod n 4===> (1+3p) mod n . . . . . . n===> (1+(n-1)p) mod n for Example if we have to interleave 8 bits such that {1,2,3,4,5,6,7,8} and we wish to interleave these bits with seed 3 then the new location of bit will be as fallows 32 | P a g e www.iiste.org
  • 5. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.3, 2011 1===> 1 2===> (1+1*3) mod 3===>4 3===> (1+2*3) mod 3===>7 4===> (1+3*3) mod 3===>2 5===> (1+4*3) mod 3===>5 6===> (1+5*3) mod 3===>8 7===> (1+6*3) mod 3===>3 8===> (1+7*3) mod 3===>6 So new order of bits will be{1,4,7,2,5,8,3,6}. The memory required by the Prime Interleaver is smaller then other available interleavers as now only seed is to be transmitted. The prime interleaving scheme reduces the bandwidth requirement that occurs in other available interleaving scheme. It is shown by the help of a comparison table 1. The bandwidth required by the Prime Interleaver (PI) is smaller than other available interleavers as now only seed is to be transmitted, in addition to very small amount of memory required at the transmitter and receiver side as well this scheme reduces the computational complexity that occurs in random interleaving scheme. 3. Maximal Ratio Receiver Combining (MRRC) Technique The block diagram of maximal ratio combining (MRC) diversity also referred as Maximal Ratio Receiver Combining (MRRC) diversity technique with IDMA scheme is shown in figure 2. In this method, the diversity branches are weighted for maximum SNR. As shown in block diagram in figure 2, d is data of k kth user, after encoding and spreading the data is randomly interleaved and termed as ‘chips’. Now this chip Signal xk is sent from the transmit antenna, which will propagate from both the channel [Shukla 2009]. If we consider 1 transmit and 2 receive antenna, then channel between transmit antenna and the first received antenna is h0 and between the transmit antenna and second receive antenna one is denoted by h1. The channel can be modeled having magnitude and phase response. So, h0 = α 0 e iθ 0 h1 = α 1 e iθ 1 (5) Noise can be added at both the receiver. The resulting received signals are R0=h0xk+n0 R1=h1xk+n1 (6) where n0 and n1 represents the noise and interference at both the receiver separately. Now the Receiver combining scheme for two branches MRRC can be written as Χ K=h0 ∗ R0 + h1 ∗ R1 (7) Now this output of maximal ratio combiner can fed to the detector for the proper estimation of transmitted signal xk. 4. PERFORMANCE ANALYSIS OF PROPOSED SCHEME For performance evaluation of IDMA scheme with MRRC diversity, it is assumed that there is no adjacent- channel and co-channel interference i.e. the simulation is performed in single cell architecture. Also, the mobility of the user in the cell is assumed to be negligible. Figure 3 and Table-1 demonstrates the bandwidth requirement of random, tree based and prime interleaver. The bandwidth required by the Prime Interleaver (PI) is smaller than other available interleavers as now only seed is to be transmitted, in addition to very small amount of memory required at the transmitter and receiver side. In Figure3.for the simulation purpose, the data length is opted to be 512 bits while 16. The 33 | P a g e www.iiste.org
  • 6. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.3, 2011 iteration at the receiver is chosen to be 15. The simulation has been performed for 100 users. Now, we present simulation results to demonstrate the performance of the MRRC diversity scheme with IDMA systems along with random and prime interleavers. Here we refer, that the channel is a flat fading Rayleigh multipath channel and the modulation is BPSK. The simulations are performed for one transmitter and two receiver arrangement. Figure 4 demonstrates the performance of IDMA scheme with rate ½ FEC convolutional coding using prime interleaver. Here two branches maximal ratio combining scheme is used for implementation of diversity technique. The performance with MRRC diversity along with FEC coding outperforms the other simulations. The block length is 2000, data length is 1024 bit/user with spread length to be 16 and number of iterations used are 15. Figure. 5 shows the BER performance of IDMA scheme with both random interleaver [3] and prime interleaver with MRRC diversity with rate ½ FEC convolutional coding. From this figure we can see that the performance with coding MRRC diversity is far better than that without coding MRRC diversity also the BER performance of prime interleaver with MRRC diversity comes out similar to that of BER performance of random interleaver with MRRC diversity. 5. Conclusion This paper demonstrates the analysis of IDMA scheme with maximal ratio receiver combining (MRRC) diversity at receiver end to overcome the effect of fading. During the performance analysis of MRRC diversity technique, the enhancement in the BER performance of IDMA scheme with coding MRRC diversity has been observed better than that of without coding MRRC diversity and the performance of IDMA systems with MRRC diversity along with Prime interleavers is found similar to that of random interleavers. Due to the advantages of same BER performance, smaller bandwidth and memory requirement, the prime interleaver can take place of the random interleaver without performance loss. References Ping L. & Lihai L. (2004), “Analysis and Design of IDMA Systems Based on SNR Evolution and Power Allocation”, Proceedings of Vehicular Technology Conference VTC 2004-Fall, IEEE, 1068-1072. Wang P., Ping L. & Liu L. (2006), “Power Allocation for Multiple Access Systems with Practical Coding and Iterative Multi-User Detection”, Proceedings of International Conference ICC`06, 11, IEEE, 4971- 4976. Shukla M., Srivastava V.K. & Tiwari S. (2009), “Analysis and Design of Optimum Interleaver for Iterative Receivers in IDMA Scheme”, Journal of Wireless Communication and Mobile Computing, 9(10), Wiley 1312-1317. Shukla M., Shukla A., Kumar R., Srivastava V.K., & Tiwari S. (2009) “Simple Diversity Scheme for IDMA Communication System,” Proceedings of International Journal of Applied Engineering Research, 4(6), 2009, RI Publications, 877-883. Shukla M., Srivastava V.K. & Tiwari S. (2006), “Interleave Division Multiple Access for Wireless Communication”, Proceedings of International Conference on Next Generation Communication Systems: A Perspective’, “ICONGENCOM 06”, J.K. Institute, Allahabad, India, 150-154. Shukla M., Srivastava V.K. & Tiwari S. (2008), “Analysis and Design of Tree Based Interleaver for Multiuser Receivers in IDMA Scheme”, Proceedings of International Conference on Networks “ICON 2008”, Delhi, India, IEEE, 1-4. Wu H., Ping L. & Perotti A. (2006), “User-specific chip-level interleavers design for IDMA system”, Elec. Letters, 42( 4), IEEE . Shukla M., Shukla A., Srivastava V.K., & Tiwari S. (2009), “Performance Evaluation of MRC Diversity Scheme for Iterative IDMA Receivers ”, Proceedings of India Conference “INDICON-09”, Gandhinagar, Gujarat, India, IEEE, 1-4. 34 | P a g e www.iiste.org
  • 7. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.3, 2011 Ping L., Wu Y. & Leung W. (2006),”Interleave-Division Multiple-Access”, Trans. on Wireless Communication, 5 (4), IEEE. 938-947. Shukla M., Shukla A., Srivastava V.K., & Tiwari S. (2009), “Different Designing Factors for IDMA Systems”, Proceedings of International Conference on Computer, Communication, and Control and Information Technology “C3 IT 2009”, Calcutta, India, Academy Publishers, 748-756. Shukla M., Srivastava V.K. & Tiwari S. (2006), “A Novel Interleaver for Interleave Division Multiple Access Scheme”, Proceedings of International Conference on Information and Communication Techniques “ICCT 07”, Dehradun, India, 843-846. Shukla M., Srivastava V.K. & Tiwari S. (2009), “Analysis of Optimum Interleaver for Iterative Receivers in IDMA Scheme”, Proceedings of International Conference on Computing and Networking “ICDCN 2009”, Springer, 400-407. Liu L., Tong J. & Ping L. (2006), “Analysis and Optimization of CDMA Systems with Chip-Level Interleavers”, Journal Selected Areas in Communication, 24, IEEE, 141-150. Akanksha Gupta is engaged in studies of M. Tech. in I.T.M. University, Gwalior, India and is working in the area Ad-Hoc Neworks, Multiple Access Scheme and Modulation Schemes. Rinkoo Bhatia is associated with I.T.M. University, Gwalior, India as Associate Professor in Electronics & Communication Engineering Department. At present she is working in the area of Cooperative Communication, Ad-Hoc Networks, routing algorithms, and Mobile Computing mechanisms. She has published several papers in national and international conferences of repute apart from various journal publications. She is also member of various professional bodies and is active in research areas. M. Shukla is associate professor of Electronics Engineering Department in Harcourt Butler Technological Institute, Kanpur, India. As an engineer-scientist-turned-faculty, Dr. Shukla’s research agenda has been extensive, ranging from information systems development to case-driven strategic technological issues. His current research interests include network security, neural network and fuzzy applications in electronics engineering, design and analysis of interleavers for multiple access schemes in wireless and mobile networks, channel coding, QOS issues, VHDL coding of communication models, and next generation networks. He has more than eighteen years of teaching and research experience in the area of circuit design and Communication Engineering. He has supervised a number of M. Tech. theses. He has worked as reviewer for several conferences and journals of repute. He has published more than fifteen research papers in different journals and conferences. Dr. Shukla’s papers have appeared in journals such as Wiley Transactions on Wireless Communication and Mobile Computing, International Journal of Applied Engineering Research, The IUP Journal of Telecommunications, and Springer Lecture Notes on Computer Science, among others. He is a member of the Institute of Electrical and Electronics Engineers (IEEE), Institution of Electronic and Telecommunication Engineers (IETE), International Society of Electronics & Electrical Engineers (ISEEE), and the Indian Society for Technical Education (ISTE). He may be ‘virtually’ reached at http://www.hbti.ac.in/Dept/ET/manoj.htm and http://www.manojkrshukla.weebly.com. 35 | P a g e www.iiste.org
  • 8. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.3, 2011 Figure 1. Transmitter and Receiver structures of IDMA scheme with K simultaneous users. 36 | P a g e www.iiste.org
  • 9. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.3, 2011 Figure 2. IDMA with proposed two branches MRRC diversity scheme for kth user 6 x 10 Comparison Graph showing Bandwidth Requirement of 4 Interleavers 5 Bandwidh requirement of Random Interleaver Bandwidth requirement of Master Random Interleaver 4.5 Bandwidth requirement of Tree Based Interleaver Bandwidth Requirement of Interleaver(No.of bits required/user) Bandwidth requirement of Prime Interleaver 4 3.5 3 2.5 2 1.5 1 0.5 0 0 10 20 30 40 50 60 70 80 90 100 User Number Figure3. Comparison of Bandwidth requirement of various interleavers 37 | P a g e www.iiste.org
  • 10. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.3, 2011 -1 10 with MRC diversity with coding PI with MRC diversity without coding PI with coding without diversity PI -2 without coding no diversity PI 10 -3 10 B it E rro r R a t e -4 10 -5 10 -6 10 -7 10 1 2 3 4 5 6 7 8 Eb/No Figure 4. Performance comparison of uncoded and coded IDMA with Prime Interleaver with MRRC diversity 38 | P a g e www.iiste.org
  • 11. Journal of Information Engineering and Applications www.iiste.org ISSN 2224-5758 (print) ISSN 2224-896X (online) Vol 1, No.3, 2011 -1 10 MRC diversity with coding PI MRC diversity with coding RI -2 MRC diversity without coding RI 10 MRC diversity without coding PI -3 10 B it E rror R ate -4 10 -5 10 -6 10 -7 10 1 2 3 4 5 6 7 8 Eb/No Figure 5. Performance comparison random interleaver and Prime Interleaver in uncoded/ coded IDMA with MRRC diversity Table1.Comparision of bandwidth requirement for transmission of interleaving mask User Count Random Interleaver Tree Based Interleaver Prime Interleaver 2 2 0 1 6 6 1 1 14 14 2 1 30 30 3 1 62 62 4 1 126 126 5 1 39 | P a g e www.iiste.org
  • 12. International Journals Call for Paper The IISTE, a U.S. publisher, is currently hosting the academic journals listed below. The peer review process of the following journals usually takes LESS THAN 14 business days and IISTE usually publishes a qualified article within 30 days. Authors should send their full paper to the following email address. More information can be found in the IISTE website : www.iiste.org Business, Economics, Finance and Management PAPER SUBMISSION EMAIL European Journal of Business and Management EJBM@iiste.org Research Journal of Finance and Accounting RJFA@iiste.org Journal of Economics and Sustainable Development JESD@iiste.org Information and Knowledge Management IKM@iiste.org Developing Country Studies DCS@iiste.org Industrial Engineering Letters IEL@iiste.org Physical Sciences, Mathematics and Chemistry PAPER SUBMISSION EMAIL Journal of Natural Sciences Research JNSR@iiste.org Chemistry and Materials Research CMR@iiste.org Mathematical Theory and Modeling MTM@iiste.org Advances in Physics Theories and Applications APTA@iiste.org Chemical and Process Engineering Research CPER@iiste.org Engineering, Technology and Systems PAPER SUBMISSION EMAIL Computer Engineering and Intelligent Systems CEIS@iiste.org Innovative Systems Design and Engineering ISDE@iiste.org Journal of Energy Technologies and Policy JETP@iiste.org Information and Knowledge Management IKM@iiste.org Control Theory and Informatics CTI@iiste.org Journal of Information Engineering and Applications JIEA@iiste.org Industrial Engineering Letters IEL@iiste.org Network and Complex Systems NCS@iiste.org Environment, Civil, Materials Sciences PAPER SUBMISSION EMAIL Journal of Environment and Earth Science JEES@iiste.org Civil and Environmental Research CER@iiste.org Journal of Natural Sciences Research JNSR@iiste.org Civil and Environmental Research CER@iiste.org Life Science, Food and Medical Sciences PAPER SUBMISSION EMAIL Journal of Natural Sciences Research JNSR@iiste.org Journal of Biology, Agriculture and Healthcare JBAH@iiste.org Food Science and Quality Management FSQM@iiste.org Chemistry and Materials Research CMR@iiste.org Education, and other Social Sciences PAPER SUBMISSION EMAIL Journal of Education and Practice JEP@iiste.org Journal of Law, Policy and Globalization JLPG@iiste.org Global knowledge sharing: New Media and Mass Communication NMMC@iiste.org EBSCO, Index Copernicus, Ulrich's Journal of Energy Technologies and Policy JETP@iiste.org Periodicals Directory, JournalTOCS, PKP Historical Research Letter HRL@iiste.org Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Public Policy and Administration Research PPAR@iiste.org Zeitschriftenbibliothek EZB, Open J-Gate, International Affairs and Global Strategy IAGS@iiste.org OCLC WorldCat, Universe Digtial Library , Research on Humanities and Social Sciences RHSS@iiste.org NewJour, Google Scholar. Developing Country Studies DCS@iiste.org IISTE is member of CrossRef. All journals Arts and Design Studies ADS@iiste.org have high IC Impact Factor Values (ICV).