SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
ISSN: 2278 - 1323
International Journal of Advanced Research in Computer Engineering and Technology (IJARCET)
Volume 2, Issue 6, June 2013
2052
www.ijarcet.org
Abstract— This paper examines the implementation of the
Genetic Algorithm (GA) optimized Singular Value
Decomposition (SVD) method to detect the presence of wireless
signal. We simulated the algorithm using common digital
signal in wireless communication namely rectangular pulse,
raised cosine and root-raised cosine to test performance of the
signal detector. The algorithm is suitable for blind spectrum
sensing where the properties of the signal to be detected are
unknown. The GA optimized SVD gives better result in the low
signal to noise (SNR) environment.
Index Terms— Cognitive radio, Genetic algorithm, signal
detector, singular value decomposition (SVD), spectrum
sensing.
I. INTRODUCTION
Cognitive radio(CR) is emerging as key enabling
technology for improving the utilization of electromagnetic
spectrum. The term cognitive radio was coined by Joseph
Mitola [1].Spectrum sensing is one of the most important
function in cognitive radio for the efficient utilization of
spectrum. Spectrum sensing is one of the major steps of
spectrum management, spectrum management consist of
four major steps [2]: 1) spectrum sensing,2)decision
making,3)Spectrum sharing and 4) Spectrum mobility.
Spectrum sensing aims to determine spectrum availability
and the presence of licensed users or primary user. Spectrum
decision is to predict how long the spectrum holes are likely
to remain available for use to the unlicensed users or
secondary users. Spectrum sharing is to distribute the
spectrum holes fairly among the secondary users bearing in
mind usage cost. Spectrum mobility is to maintain seamless
communication requirements during the transition to better
spectrum.
There are various spectrum sensing techniques such as
energy detection (ED), the eigenvalue based detection, the
covariance based detection, feature based detection, and
singular value based detection. These methods are discussed
in [3], [4], [5].
Eigenvalue based detection techniques achieve
both high probability of detection and low probability of
false alarm with minimal knowledge about the primary user
signals [6].The SVD method is quite similar to the
eigenvalue decomposition method, but it can be applied to
Manuscript received June, 2013.
Nidhi Chandel, Electronics and Communication department, RGPV
University,IES IPS Acadeny Indore, India, 9301818435
Rajesh B. Ahirwar Electronics and Communication department, RGPV
University,IES IPS Acdemy,Indore,India,9993374418.,
matrix while, eigenvalue decomposition is only
applicable to matrix.SVD has several advantage as
compared to the other decomposition method as it is more
robust to numerical error [7].Genetic algorithm is an
iterative process defined by Holland [8] as a metaphor of
the Darwinian theory of evolution applied to biology
Genetic algorithm is an optimization technique here it is
used to optimize the value of L(number of column ) in
covariance matrix.GA optimized SVD gives better result as
compared to SVD based detection.
The rest of the paper is organized as follows. Common
signal detection model for spectrum sensing is introduced in
section II. SVD based signal detection given in section III.
Genetic Algorithm is described in section IV. Algorithm for
signal detection given in section V. In section VI threshold
value is determined. In Section VII, simulation parameters
and results of implementing GA optimized SVD based
signal detector is described. Finally conclusion is given in
section VIII.
II. SYSTEM MODEL
In spectrum sensing technique, for detecting a signal two
hypothesis are involved. and . is null hypothesis,
meaning signal does not present; , means signal is
present. The received signal under two hypothesis is given
as [9],[10].
H0: y(n )= w(n) (1)
H1 : y(n) = s(n)+ w(n) (2)
Where,
y(n): is a received signal
s(n): is a transmitted signal samples
w(n): is white noise which is independent and
identically distributed. The decision statistics of the energy
detector [4] can be defined as the average energy of N
observed samples
(3)
There are two probabilities involved for signal detection:
probability of detection Pd which defines the hypothesis .
Probability of false alarm; which defines at hypothesis
[9].
(4)
(5)
GA optimized SVD based signal detector for
Cognitive radio Networks
Nidhi Chandel and Mr. Rajesh B. Ahirwar
ISSN: 2278 - 1323
International Journal of Advanced Research in Computer Engineering and Technology (IJARCET)
Volume 2, Issue 6, June 2013
2053
www.ijarcet.org
III. SVD BASED SIGNAL DETECTOR
SVD plays an important role in statistics and signal
processing and, particularly in the area of a linear system.
For a time series y (n) with n=1, 2….N, a matrix with L
column and M=N-L+1 rows is constructed,
(6)
Here, A is an M×L matrix. Its elements can be found by
substituting of y (n), Using SVD [11], A can be factorized as
A= U S
(7)
Where, U and V are an M×M and L×L unitary matrix
respectively. The columns of U and V are called left and
right singular vectors, for A. S is diagonal matrix whose non
negative entries are arranged in diagonal in a decreasing
manner. S is a rectangular matrix with the same dimension
as A. When signals are received whose power is higher than
the threshold, there exist several dominant singular values to
represent these signals
In implementing SVD based signal detector, we adopt
method by Zeng and Liang (2007) in [12].SVD based signal
detector has following algorithm to detect the presence of
signal
Step 1:Select the number of column of covariance matrix
L.
Step 2: Factorized the matrix using SVD to form equation
as in (7).
Step 3:Obtain maximum and minimum Eigenvalues of
matrix which are and
Step 4: Compute threshold value, γ.
Step 5: Compare the ratio with the threshold. If
the signal is present, otherwise the signal is not present.
IV. GENETIC ALGORITHM
GA is an iterative process. Each iteration is called a
generation. A typical number of generations for a simple
GA can range from 50 to over 500. In a genetic algorithm, a
population of strings, which encode candidate solutions to
an optimization problem, evolves toward better solutions.
Solutions are represented in binary as strings of 0s and 1s,
but other encodings are also possible. Flow chart of genetic
algorithm is shown in figure1.
V. ALGORITHM FOR GA OPTIMIZED SVD BASED SIGNAL
DETECTOR
Step 1: Optimized the value of L,by Genetic algorithm.
Step 2: Factorized the matrix using SVD to form equation as
in (7)
Step 3: Obtain maximum and minimum Eigenvalues of
matrix which are and .
Step 4: Compute threshold value, γ. The threshold value
determination will be highlighted in the next section.
Step 5: Compare the ratio with the threshold.
If the signal is present, otherwise the signal is
not present.
Figure1.Flow chart of the Genetic Algorithm [13]
VI. THRESHOLD DETERMINATION
In terms of desired probability of false alarm ,detection
threshold can be calculated by using the results of the
theorem in [14] and [12] and it is given as follows(here
M=1)
Where, denotes detection threshold. denotes
the inverse of cumulative distribution function of the Tracy
Widom distribution of order 1 [15]. is the number of
samples and L denotes the level of covariance matrix.
The density of test statistic, is required to define
threshold in terms of probability of false alarm or vice versa
and is defined as, the ratio of maximum eigenvalues to
minimum eigenvalues of received signal of covariance
matrix as follows:
(9)
start
Create randomly selected initial
population
Fitness evaluation
Optimal
solution ?
Stop
Reproduction
Fit
Chromosome
?
Mutation
Discard
Yes
No
Yes
No
ISSN: 2278 - 1323
International Journal of Advanced Research in Computer Engineering and Technology (IJARCET)
Volume 2, Issue 6, June 2013
2054
www.ijarcet.org
VII. SIMULATION PARAMETERS AND RESULTS
A. Simulation parameters
Additive white Gaussian noise channel is used. It is
assumed that the channel is not changing during the period
of samples. The results are averaged over 1000 tests using
Monte Carlo simulations written in MATLAB. Simulation
results are taken using MPSK modulated random primary
signal and independent and identically distributed (iid) noise
sample with Gaussian distribution are used. Three types of
signal namely rectangular pulse, raised cosine and root-
raised cosine were listed and compared. To find the
threshold, we require the probability of false alarm is Pfa 0.1
and probability of detection is Pd 0.9 as required by IEEE
802.22 standard.
B. Simulation results
Figure 1 shows simulation results of the probability of
detection (Pd) when the GA optimized SVD method and
SVD method are used for comparison when SNR ranges
from -16 dB to -4 dB. From these figures, it can be
concluded that the GA optimized SVD based detection gives
better results than SVD based detection in low SNR. It can
be noticed from the graph that the performance of the SVD
method and GA optimized SVD are nearly equal at -6 dB
,while GA optimized SVD shows better results at -16 dB for
all the three signals ,rectangular pulse signal, raised cosine
and root-raised cosine. Although SVD at certain points
better than the GA optimized SVD method for root raised
cosine signal, but the overall performance of the detector is
better than the SVD method.
-16 -14 -12 -10 -8 -6 -4
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
SNR (db)
Probabilityofdetection(pd
)
Rectangular Pulse
SVD
GA
a) Rectangular pulse signal
-16 -14 -12 -10 -8 -6 -4
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
SNR (db)
Probabilityofdetection(p
d
)
Raised Cosine
SVD
GA
b) Raised cosine signal
-16 -14 -12 -10 -8 -6 -4
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
SNR (db)
Probabilityofdetection(Pd
)
Root Raised Cosine
SVD
GA
c) Root- raised cosine signal
Figure2: Comparision of Pd between the SVD method and
energy detector for (a) Rectangular pulse signal; (b) Raised
cosine signal(c) Root-raised cosine signal
In terms of performance of the detector, the receiver
operating characteristic (ROC) curves are shown in figure2.
Both methods were simulated at -16 dB SNR and tested for
three types of signal we plot the Pd under H1 against Pfa
under Ho when Pfa changes from 0.01 to the desired value
of 0.1.It is clearly shown that the ROC curves of the GA
optimized based detection are higher than the SVD method
which proves the good performance of the detector.
0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08 0.09 0.1
0.1
0.12
0.14
0.16
0.18
0.2
0.22
Probability of false alarm (Pfa
)
Probabilityofdetection(Pd
)
Rectangular Pulse
SVD
GA
a) Rectangular pulse signal
0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08 0.09 0.1
0.08
0.1
0.12
0.14
0.16
0.18
0.2
0.22
Probability of false alarm (Pfa
)
Probabilityofdetection(Pd
)
Raised Cosine
SVD
GA
b) Raised cosine signal
ISSN: 2278 - 1323
International Journal of Advanced Research in Computer Engineering and Technology (IJARCET)
Volume 2, Issue 6, June 2013
2055
www.ijarcet.org
0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08 0.09 0.1
0.1
0.12
0.14
0.16
0.18
0.2
0.22
Probability of false alarm (Pfa
)
Probabilityofdetection(Pd
)
Root Raised Cosine
SVD
GA
c) Root-raised cosine signal
Figure3: Comparision of ROC curves between SVD
method and energy detector for a) Rectangular pulse
signal)Raised cosine signal c) Root-raised cosine signal
VIII. CONCLUSION
In this paper, we implemented a GA optimized SVD-
based approach to detect common signals in today’s digital
communication system. The rationale of detecting common
signals is that, in order for a Cognitive Radio system to
operate with an expectable quality of service. The brief
simulation results show that GA optimized SVD of the data
matrix finds the optimized value of L (no. of column).The
method is more robust to numerical errors and very fast.
These qualities are desirable in IEEE 802.22 standard since
it is easily suited the need to shorten the period of sensing
spectrum.
.
REFERENCES
[1] J. Mitola and G. Q. Maguire, “Cognitive radio: making software
radios more personal,” Personal Communications, IEEE, vol. 6, no. 4,
pp. 13–18, Aug. 1999.
[2] S. Haykin, “Cognitive radio: brain-empowered wireless
communications,” IEEE Journal on Selected Areas in
Communications, vol. 23, no. 2, pp. 201–220, Feb. 2005.
[3] S. Xu, Y. Shang, and H. Wang, “Svd based sensing of a wireless
microphone signal in cognitive radio networks,” in 11th IEEE
Singapore International Conference on Communication Systems,
2008 (ICCS 2008), 2008, pp. 222 –226.
[4] T. Yucek and H. Arslan, “A survey of spectrum sensing algorithms
for cognitive radio applications,” Communications Surveys Tutorials,
IEEE, vol. 11, no. 1, pp. 116 –130, 2009.
[5] I. F. Akyildiz, W.-Y. Lee, M. C. Vuran, and S. Mohanty, “NeXt
generation/dynamic spectrum access/cognitive radio wireless
networks: a survey,” Comput. Netw., vol. 50, no. 13, pp. 2127–2159,
2006
[6] A. Kortun, T. Ratnarajah, M. Sellathurai, and C. Zhong, “On the
performance of eigenvalue-based spectrum sensing for cognitive
radio,” in New Frontiers in Dynamic Spectrum, 2010 IEEE
Symposium on, 2010, pp. 1 –6.
[7] S. Leach, “Singular value decomposition – a primer,” Solutions, p. 8,
2000. [Online].
Available:http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.
6587
[8] Holland, J. 1975. Adaptation in Natural and Artificial Systems.
University of Michigan Press
[9] Beibei Wang and K. J. Ray Liu, “Advances in Cognitive Radio
Networks: A Survey,” in IEEE journal of selected topics in signal
processing,vol.5,no.1,February 2011,pp.5-23.
[10] A. Sahai and D. Cabric, “Spectrum sensing: Fundamental limits and
practical challenges,” in IEEE International Symposium on New
Frontiers Dynamic Spectrum Access Networks (DySPAN),
November 2005, Baltimore, MD.
[11] D. Tufts and R. Kumaresan, “Singular value decomposition and
improved frequency estimation using linear prediction,” Acoustics,
Speech and Signal Processing, IEEE Transactions on, vol. 30, no. 4,
pp. 671 – 675, Aug..
[12] 1982Y. Zeng and Y.-C. Liang, “Maximum-minimum eigenvalue
detection for cognitive radio,” in IEEE 18th International Symposium
on Personal, Indoor and Mobile Radio Communications PIMRC
2007., 2007, pp. 1 –5
[13] Sapna Katiyar, A Comparative Study of Genetic Algorithm and the
Particle Swarm Optimization,” A.B.E.S. Institute of Technology,
Ghaziabad
[14] I. M. Johnstone, “On the distribution of the largest eigenvalue in
principal components analysis,” Annals of Statistics, vol. 29, no. 2,
pp. 295–327, 2001.
[15] C. A. Tracy and H. Widom, The distribution of the largest eigenvalue
in the Gaussian ensembles, ser. CRM Series in Mathematical Physics
4. New York: Springer-Verlag, 2000, pp. 641–472.

Contenu connexe

Tendances

A statistical approach to spectrum sensing using bayes factor and p-Values
A statistical approach to spectrum sensing using bayes factor and p-ValuesA statistical approach to spectrum sensing using bayes factor and p-Values
A statistical approach to spectrum sensing using bayes factor and p-ValuesIJECEIAES
 
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor NetworksA New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor Networksidescitation
 
Quality Prediction in Fingerprint Compression
Quality Prediction in Fingerprint CompressionQuality Prediction in Fingerprint Compression
Quality Prediction in Fingerprint CompressionIJTET Journal
 
Diagnosis of Faulty Sensors in Antenna Array using Hybrid Differential Evolut...
Diagnosis of Faulty Sensors in Antenna Array using Hybrid Differential Evolut...Diagnosis of Faulty Sensors in Antenna Array using Hybrid Differential Evolut...
Diagnosis of Faulty Sensors in Antenna Array using Hybrid Differential Evolut...IJECEIAES
 
Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...
Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...
Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...IJMTST Journal
 
Virtual 2 d positioning system by using wireless sensors in indoor environment
Virtual 2 d positioning system by using wireless sensors in indoor environmentVirtual 2 d positioning system by using wireless sensors in indoor environment
Virtual 2 d positioning system by using wireless sensors in indoor environmentijwmn
 
Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...
Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...
Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...IJERA Editor
 
Neural Network Algorithm for Radar Signal Recognition
Neural Network Algorithm for Radar Signal RecognitionNeural Network Algorithm for Radar Signal Recognition
Neural Network Algorithm for Radar Signal RecognitionIJERA Editor
 
Novel algorithms for Knowledge discovery from neural networks in Classificat...
Novel algorithms for  Knowledge discovery from neural networks in Classificat...Novel algorithms for  Knowledge discovery from neural networks in Classificat...
Novel algorithms for Knowledge discovery from neural networks in Classificat...Dr.(Mrs).Gethsiyal Augasta
 
1103.0305
1103.03051103.0305
1103.0305nk179
 
11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...Alexander Decker
 
Advanced atpg based on fan, testability measures and fault reduction
Advanced atpg based on fan, testability measures and fault reductionAdvanced atpg based on fan, testability measures and fault reduction
Advanced atpg based on fan, testability measures and fault reductionVLSICS Design
 
Intelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural NetworkIntelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural NetworkIJERA Editor
 
Bounds on the Achievable Rates of Faded Dirty Paper Channel
Bounds on the Achievable Rates of Faded Dirty Paper Channel Bounds on the Achievable Rates of Faded Dirty Paper Channel
Bounds on the Achievable Rates of Faded Dirty Paper Channel IJCNCJournal
 
Performance Analysis of Group-Blind Multiuser Detectors for Synchronous CDMA
Performance Analysis of Group-Blind Multiuser Detectors for Synchronous CDMAPerformance Analysis of Group-Blind Multiuser Detectors for Synchronous CDMA
Performance Analysis of Group-Blind Multiuser Detectors for Synchronous CDMAidescitation
 
Spectrum Sensing Detection Techniques for Overlay Users
Spectrum Sensing Detection Techniques for Overlay UsersSpectrum Sensing Detection Techniques for Overlay Users
Spectrum Sensing Detection Techniques for Overlay UsersIJMTST Journal
 
Array diagnosis using compressed sensing in near field
Array diagnosis using compressed sensing in near fieldArray diagnosis using compressed sensing in near field
Array diagnosis using compressed sensing in near fieldAlexander Decker
 

Tendances (20)

A statistical approach to spectrum sensing using bayes factor and p-Values
A statistical approach to spectrum sensing using bayes factor and p-ValuesA statistical approach to spectrum sensing using bayes factor and p-Values
A statistical approach to spectrum sensing using bayes factor and p-Values
 
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor NetworksA New Approach for Error Reduction in Localization for Wireless Sensor Networks
A New Approach for Error Reduction in Localization for Wireless Sensor Networks
 
Quality Prediction in Fingerprint Compression
Quality Prediction in Fingerprint CompressionQuality Prediction in Fingerprint Compression
Quality Prediction in Fingerprint Compression
 
Diagnosis of Faulty Sensors in Antenna Array using Hybrid Differential Evolut...
Diagnosis of Faulty Sensors in Antenna Array using Hybrid Differential Evolut...Diagnosis of Faulty Sensors in Antenna Array using Hybrid Differential Evolut...
Diagnosis of Faulty Sensors in Antenna Array using Hybrid Differential Evolut...
 
Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...
Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...
Spectrum Sensing Detection with Sequential Forward Search in Comparison to Kn...
 
Virtual 2 d positioning system by using wireless sensors in indoor environment
Virtual 2 d positioning system by using wireless sensors in indoor environmentVirtual 2 d positioning system by using wireless sensors in indoor environment
Virtual 2 d positioning system by using wireless sensors in indoor environment
 
Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...
Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...
Compressive Sensing in Speech from LPC using Gradient Projection for Sparse R...
 
Neural Network Algorithm for Radar Signal Recognition
Neural Network Algorithm for Radar Signal RecognitionNeural Network Algorithm for Radar Signal Recognition
Neural Network Algorithm for Radar Signal Recognition
 
Novel algorithms for Knowledge discovery from neural networks in Classificat...
Novel algorithms for  Knowledge discovery from neural networks in Classificat...Novel algorithms for  Knowledge discovery from neural networks in Classificat...
Novel algorithms for Knowledge discovery from neural networks in Classificat...
 
1103.0305
1103.03051103.0305
1103.0305
 
Ijecet 06 06_002
Ijecet 06 06_002Ijecet 06 06_002
Ijecet 06 06_002
 
11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...
 
Rfid based localization
Rfid based localizationRfid based localization
Rfid based localization
 
F045033440
F045033440F045033440
F045033440
 
Advanced atpg based on fan, testability measures and fault reduction
Advanced atpg based on fan, testability measures and fault reductionAdvanced atpg based on fan, testability measures and fault reduction
Advanced atpg based on fan, testability measures and fault reduction
 
Intelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural NetworkIntelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural Network
 
Bounds on the Achievable Rates of Faded Dirty Paper Channel
Bounds on the Achievable Rates of Faded Dirty Paper Channel Bounds on the Achievable Rates of Faded Dirty Paper Channel
Bounds on the Achievable Rates of Faded Dirty Paper Channel
 
Performance Analysis of Group-Blind Multiuser Detectors for Synchronous CDMA
Performance Analysis of Group-Blind Multiuser Detectors for Synchronous CDMAPerformance Analysis of Group-Blind Multiuser Detectors for Synchronous CDMA
Performance Analysis of Group-Blind Multiuser Detectors for Synchronous CDMA
 
Spectrum Sensing Detection Techniques for Overlay Users
Spectrum Sensing Detection Techniques for Overlay UsersSpectrum Sensing Detection Techniques for Overlay Users
Spectrum Sensing Detection Techniques for Overlay Users
 
Array diagnosis using compressed sensing in near field
Array diagnosis using compressed sensing in near fieldArray diagnosis using compressed sensing in near field
Array diagnosis using compressed sensing in near field
 

En vedette

Volume 2-issue-6-1979-1982
Volume 2-issue-6-1979-1982Volume 2-issue-6-1979-1982
Volume 2-issue-6-1979-1982Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Annisa ulfah dan rusida sari xii ips 2
Annisa ulfah dan rusida sari xii ips 2Annisa ulfah dan rusida sari xii ips 2
Annisa ulfah dan rusida sari xii ips 2Paarief Udin
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276Editor IJARCET
 
Volume 2-issue-6-1950-1954
Volume 2-issue-6-1950-1954Volume 2-issue-6-1950-1954
Volume 2-issue-6-1950-1954Editor IJARCET
 
Magfirah dinna septiani xii ips 1 tugas persentasi
Magfirah dinna septiani xii ips 1 tugas persentasiMagfirah dinna septiani xii ips 1 tugas persentasi
Magfirah dinna septiani xii ips 1 tugas persentasiPaarief Udin
 

En vedette (18)

Volume 2-issue-6-1979-1982
Volume 2-issue-6-1979-1982Volume 2-issue-6-1979-1982
Volume 2-issue-6-1979-1982
 
1904 1908
1904 19081904 1908
1904 1908
 
1829 1833
1829 18331829 1833
1829 1833
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Apollo weronika
Apollo weronikaApollo weronika
Apollo weronika
 
Practica blog
Practica blogPractica blog
Practica blog
 
Emilda
EmildaEmilda
Emilda
 
Paso a paso
Paso a pasoPaso a paso
Paso a paso
 
Annisa ulfah dan rusida sari xii ips 2
Annisa ulfah dan rusida sari xii ips 2Annisa ulfah dan rusida sari xii ips 2
Annisa ulfah dan rusida sari xii ips 2
 
Erynie Ania
Erynie AniaErynie Ania
Erynie Ania
 
1866 1872
1866 18721866 1872
1866 1872
 
Archivo gbi angie
Archivo gbi angieArchivo gbi angie
Archivo gbi angie
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276Ijarcet vol-2-issue-7-2273-2276
Ijarcet vol-2-issue-7-2273-2276
 
1816 1819
1816 18191816 1819
1816 1819
 
Volume 2-issue-6-1950-1954
Volume 2-issue-6-1950-1954Volume 2-issue-6-1950-1954
Volume 2-issue-6-1950-1954
 
Magfirah dinna septiani xii ips 1 tugas persentasi
Magfirah dinna septiani xii ips 1 tugas persentasiMagfirah dinna septiani xii ips 1 tugas persentasi
Magfirah dinna septiani xii ips 1 tugas persentasi
 

Similaire à GA Optimized SVD Signal Detector

Cooperative Spectrum Sensing Technique Based on Blind Detection Method
Cooperative Spectrum Sensing Technique Based on Blind Detection MethodCooperative Spectrum Sensing Technique Based on Blind Detection Method
Cooperative Spectrum Sensing Technique Based on Blind Detection MethodINFOGAIN PUBLICATION
 
Performance analysis of cooperative spectrum sensing using double dynamic thr...
Performance analysis of cooperative spectrum sensing using double dynamic thr...Performance analysis of cooperative spectrum sensing using double dynamic thr...
Performance analysis of cooperative spectrum sensing using double dynamic thr...IAESIJAI
 
Analysis of spectrum based approach for detection of mobile signals
Analysis of spectrum based approach for detection of mobile signalsAnalysis of spectrum based approach for detection of mobile signals
Analysis of spectrum based approach for detection of mobile signalsIAEME Publication
 
A combined spectrum sensing method based DCT for cognitive radio system
A combined spectrum sensing method based DCT for cognitive radio system  A combined spectrum sensing method based DCT for cognitive radio system
A combined spectrum sensing method based DCT for cognitive radio system IJECEIAES
 
QRC-ESPRIT Method for Wideband Signals
QRC-ESPRIT Method for Wideband SignalsQRC-ESPRIT Method for Wideband Signals
QRC-ESPRIT Method for Wideband SignalsIDES Editor
 
Jurnal puput dani prasetyo adi
Jurnal puput dani prasetyo adiJurnal puput dani prasetyo adi
Jurnal puput dani prasetyo adiPuput Dani
 
Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...
Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...
Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...sipij
 
14 a blind edit ms word (edit tyas)2
14 a blind edit ms word (edit tyas)214 a blind edit ms word (edit tyas)2
14 a blind edit ms word (edit tyas)2IAESIJEECS
 
Automatic digital modulation recognition using articial
Automatic digital modulation recognition using articialAutomatic digital modulation recognition using articial
Automatic digital modulation recognition using articialHemant Ingale
 
Distributed fault tolerant event
Distributed fault tolerant eventDistributed fault tolerant event
Distributed fault tolerant eventijscai
 
Performance comparison of automatic peak detection for signal analyser
Performance comparison of automatic peak detection for signal analyserPerformance comparison of automatic peak detection for signal analyser
Performance comparison of automatic peak detection for signal analyserjournalBEEI
 
An ann approach for network
An ann approach for networkAn ann approach for network
An ann approach for networkIJNSA Journal
 
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...IJNSA Journal
 
Rigorous Pack Edge Detection Fuzzy System
Rigorous Pack Edge Detection Fuzzy SystemRigorous Pack Edge Detection Fuzzy System
Rigorous Pack Edge Detection Fuzzy Systeminventy
 
A Sphere Decoding Algorithm for MIMO
A Sphere Decoding Algorithm for MIMOA Sphere Decoding Algorithm for MIMO
A Sphere Decoding Algorithm for MIMOIRJET Journal
 
Analysis and Comparison of Different Spectrum Sensing Technique for WLAN
Analysis and Comparison of Different Spectrum Sensing Technique for WLANAnalysis and Comparison of Different Spectrum Sensing Technique for WLAN
Analysis and Comparison of Different Spectrum Sensing Technique for WLANijtsrd
 
New Data Association Technique for Target Tracking in Dense Clutter Environme...
New Data Association Technique for Target Tracking in Dense Clutter Environme...New Data Association Technique for Target Tracking in Dense Clutter Environme...
New Data Association Technique for Target Tracking in Dense Clutter Environme...CSCJournals
 
Hardware efficient singular value decomposition in mimo ofdm system
Hardware efficient singular value decomposition in mimo ofdm systemHardware efficient singular value decomposition in mimo ofdm system
Hardware efficient singular value decomposition in mimo ofdm systemIAEME Publication
 
Weighted Least Squared Approach to Fault Detection and Isolation for GPS Inte...
Weighted Least Squared Approach to Fault Detection and Isolation for GPS Inte...Weighted Least Squared Approach to Fault Detection and Isolation for GPS Inte...
Weighted Least Squared Approach to Fault Detection and Isolation for GPS Inte...TELKOMNIKA JOURNAL
 
Error bounds for wireless localization in NLOS environments
Error bounds for wireless localization in NLOS environmentsError bounds for wireless localization in NLOS environments
Error bounds for wireless localization in NLOS environmentsIJECEIAES
 

Similaire à GA Optimized SVD Signal Detector (20)

Cooperative Spectrum Sensing Technique Based on Blind Detection Method
Cooperative Spectrum Sensing Technique Based on Blind Detection MethodCooperative Spectrum Sensing Technique Based on Blind Detection Method
Cooperative Spectrum Sensing Technique Based on Blind Detection Method
 
Performance analysis of cooperative spectrum sensing using double dynamic thr...
Performance analysis of cooperative spectrum sensing using double dynamic thr...Performance analysis of cooperative spectrum sensing using double dynamic thr...
Performance analysis of cooperative spectrum sensing using double dynamic thr...
 
Analysis of spectrum based approach for detection of mobile signals
Analysis of spectrum based approach for detection of mobile signalsAnalysis of spectrum based approach for detection of mobile signals
Analysis of spectrum based approach for detection of mobile signals
 
A combined spectrum sensing method based DCT for cognitive radio system
A combined spectrum sensing method based DCT for cognitive radio system  A combined spectrum sensing method based DCT for cognitive radio system
A combined spectrum sensing method based DCT for cognitive radio system
 
QRC-ESPRIT Method for Wideband Signals
QRC-ESPRIT Method for Wideband SignalsQRC-ESPRIT Method for Wideband Signals
QRC-ESPRIT Method for Wideband Signals
 
Jurnal puput dani prasetyo adi
Jurnal puput dani prasetyo adiJurnal puput dani prasetyo adi
Jurnal puput dani prasetyo adi
 
Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...
Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...
Improvement of Anomaly Detection Algorithms in Hyperspectral Images Using Dis...
 
14 a blind edit ms word (edit tyas)2
14 a blind edit ms word (edit tyas)214 a blind edit ms word (edit tyas)2
14 a blind edit ms word (edit tyas)2
 
Automatic digital modulation recognition using articial
Automatic digital modulation recognition using articialAutomatic digital modulation recognition using articial
Automatic digital modulation recognition using articial
 
Distributed fault tolerant event
Distributed fault tolerant eventDistributed fault tolerant event
Distributed fault tolerant event
 
Performance comparison of automatic peak detection for signal analyser
Performance comparison of automatic peak detection for signal analyserPerformance comparison of automatic peak detection for signal analyser
Performance comparison of automatic peak detection for signal analyser
 
An ann approach for network
An ann approach for networkAn ann approach for network
An ann approach for network
 
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
AN ANN APPROACH FOR NETWORK INTRUSION DETECTION USING ENTROPY BASED FEATURE S...
 
Rigorous Pack Edge Detection Fuzzy System
Rigorous Pack Edge Detection Fuzzy SystemRigorous Pack Edge Detection Fuzzy System
Rigorous Pack Edge Detection Fuzzy System
 
A Sphere Decoding Algorithm for MIMO
A Sphere Decoding Algorithm for MIMOA Sphere Decoding Algorithm for MIMO
A Sphere Decoding Algorithm for MIMO
 
Analysis and Comparison of Different Spectrum Sensing Technique for WLAN
Analysis and Comparison of Different Spectrum Sensing Technique for WLANAnalysis and Comparison of Different Spectrum Sensing Technique for WLAN
Analysis and Comparison of Different Spectrum Sensing Technique for WLAN
 
New Data Association Technique for Target Tracking in Dense Clutter Environme...
New Data Association Technique for Target Tracking in Dense Clutter Environme...New Data Association Technique for Target Tracking in Dense Clutter Environme...
New Data Association Technique for Target Tracking in Dense Clutter Environme...
 
Hardware efficient singular value decomposition in mimo ofdm system
Hardware efficient singular value decomposition in mimo ofdm systemHardware efficient singular value decomposition in mimo ofdm system
Hardware efficient singular value decomposition in mimo ofdm system
 
Weighted Least Squared Approach to Fault Detection and Isolation for GPS Inte...
Weighted Least Squared Approach to Fault Detection and Isolation for GPS Inte...Weighted Least Squared Approach to Fault Detection and Isolation for GPS Inte...
Weighted Least Squared Approach to Fault Detection and Isolation for GPS Inte...
 
Error bounds for wireless localization in NLOS environments
Error bounds for wireless localization in NLOS environmentsError bounds for wireless localization in NLOS environments
Error bounds for wireless localization in NLOS environments
 

Plus de Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Editor IJARCET
 

Plus de Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 
Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101Volume 2-issue-6-2098-2101
Volume 2-issue-6-2098-2101
 

Dernier

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 

Dernier (20)

Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 

GA Optimized SVD Signal Detector

  • 1. ISSN: 2278 - 1323 International Journal of Advanced Research in Computer Engineering and Technology (IJARCET) Volume 2, Issue 6, June 2013 2052 www.ijarcet.org Abstract— This paper examines the implementation of the Genetic Algorithm (GA) optimized Singular Value Decomposition (SVD) method to detect the presence of wireless signal. We simulated the algorithm using common digital signal in wireless communication namely rectangular pulse, raised cosine and root-raised cosine to test performance of the signal detector. The algorithm is suitable for blind spectrum sensing where the properties of the signal to be detected are unknown. The GA optimized SVD gives better result in the low signal to noise (SNR) environment. Index Terms— Cognitive radio, Genetic algorithm, signal detector, singular value decomposition (SVD), spectrum sensing. I. INTRODUCTION Cognitive radio(CR) is emerging as key enabling technology for improving the utilization of electromagnetic spectrum. The term cognitive radio was coined by Joseph Mitola [1].Spectrum sensing is one of the most important function in cognitive radio for the efficient utilization of spectrum. Spectrum sensing is one of the major steps of spectrum management, spectrum management consist of four major steps [2]: 1) spectrum sensing,2)decision making,3)Spectrum sharing and 4) Spectrum mobility. Spectrum sensing aims to determine spectrum availability and the presence of licensed users or primary user. Spectrum decision is to predict how long the spectrum holes are likely to remain available for use to the unlicensed users or secondary users. Spectrum sharing is to distribute the spectrum holes fairly among the secondary users bearing in mind usage cost. Spectrum mobility is to maintain seamless communication requirements during the transition to better spectrum. There are various spectrum sensing techniques such as energy detection (ED), the eigenvalue based detection, the covariance based detection, feature based detection, and singular value based detection. These methods are discussed in [3], [4], [5]. Eigenvalue based detection techniques achieve both high probability of detection and low probability of false alarm with minimal knowledge about the primary user signals [6].The SVD method is quite similar to the eigenvalue decomposition method, but it can be applied to Manuscript received June, 2013. Nidhi Chandel, Electronics and Communication department, RGPV University,IES IPS Acadeny Indore, India, 9301818435 Rajesh B. Ahirwar Electronics and Communication department, RGPV University,IES IPS Acdemy,Indore,India,9993374418., matrix while, eigenvalue decomposition is only applicable to matrix.SVD has several advantage as compared to the other decomposition method as it is more robust to numerical error [7].Genetic algorithm is an iterative process defined by Holland [8] as a metaphor of the Darwinian theory of evolution applied to biology Genetic algorithm is an optimization technique here it is used to optimize the value of L(number of column ) in covariance matrix.GA optimized SVD gives better result as compared to SVD based detection. The rest of the paper is organized as follows. Common signal detection model for spectrum sensing is introduced in section II. SVD based signal detection given in section III. Genetic Algorithm is described in section IV. Algorithm for signal detection given in section V. In section VI threshold value is determined. In Section VII, simulation parameters and results of implementing GA optimized SVD based signal detector is described. Finally conclusion is given in section VIII. II. SYSTEM MODEL In spectrum sensing technique, for detecting a signal two hypothesis are involved. and . is null hypothesis, meaning signal does not present; , means signal is present. The received signal under two hypothesis is given as [9],[10]. H0: y(n )= w(n) (1) H1 : y(n) = s(n)+ w(n) (2) Where, y(n): is a received signal s(n): is a transmitted signal samples w(n): is white noise which is independent and identically distributed. The decision statistics of the energy detector [4] can be defined as the average energy of N observed samples (3) There are two probabilities involved for signal detection: probability of detection Pd which defines the hypothesis . Probability of false alarm; which defines at hypothesis [9]. (4) (5) GA optimized SVD based signal detector for Cognitive radio Networks Nidhi Chandel and Mr. Rajesh B. Ahirwar
  • 2. ISSN: 2278 - 1323 International Journal of Advanced Research in Computer Engineering and Technology (IJARCET) Volume 2, Issue 6, June 2013 2053 www.ijarcet.org III. SVD BASED SIGNAL DETECTOR SVD plays an important role in statistics and signal processing and, particularly in the area of a linear system. For a time series y (n) with n=1, 2….N, a matrix with L column and M=N-L+1 rows is constructed, (6) Here, A is an M×L matrix. Its elements can be found by substituting of y (n), Using SVD [11], A can be factorized as A= U S (7) Where, U and V are an M×M and L×L unitary matrix respectively. The columns of U and V are called left and right singular vectors, for A. S is diagonal matrix whose non negative entries are arranged in diagonal in a decreasing manner. S is a rectangular matrix with the same dimension as A. When signals are received whose power is higher than the threshold, there exist several dominant singular values to represent these signals In implementing SVD based signal detector, we adopt method by Zeng and Liang (2007) in [12].SVD based signal detector has following algorithm to detect the presence of signal Step 1:Select the number of column of covariance matrix L. Step 2: Factorized the matrix using SVD to form equation as in (7). Step 3:Obtain maximum and minimum Eigenvalues of matrix which are and Step 4: Compute threshold value, γ. Step 5: Compare the ratio with the threshold. If the signal is present, otherwise the signal is not present. IV. GENETIC ALGORITHM GA is an iterative process. Each iteration is called a generation. A typical number of generations for a simple GA can range from 50 to over 500. In a genetic algorithm, a population of strings, which encode candidate solutions to an optimization problem, evolves toward better solutions. Solutions are represented in binary as strings of 0s and 1s, but other encodings are also possible. Flow chart of genetic algorithm is shown in figure1. V. ALGORITHM FOR GA OPTIMIZED SVD BASED SIGNAL DETECTOR Step 1: Optimized the value of L,by Genetic algorithm. Step 2: Factorized the matrix using SVD to form equation as in (7) Step 3: Obtain maximum and minimum Eigenvalues of matrix which are and . Step 4: Compute threshold value, γ. The threshold value determination will be highlighted in the next section. Step 5: Compare the ratio with the threshold. If the signal is present, otherwise the signal is not present. Figure1.Flow chart of the Genetic Algorithm [13] VI. THRESHOLD DETERMINATION In terms of desired probability of false alarm ,detection threshold can be calculated by using the results of the theorem in [14] and [12] and it is given as follows(here M=1) Where, denotes detection threshold. denotes the inverse of cumulative distribution function of the Tracy Widom distribution of order 1 [15]. is the number of samples and L denotes the level of covariance matrix. The density of test statistic, is required to define threshold in terms of probability of false alarm or vice versa and is defined as, the ratio of maximum eigenvalues to minimum eigenvalues of received signal of covariance matrix as follows: (9) start Create randomly selected initial population Fitness evaluation Optimal solution ? Stop Reproduction Fit Chromosome ? Mutation Discard Yes No Yes No
  • 3. ISSN: 2278 - 1323 International Journal of Advanced Research in Computer Engineering and Technology (IJARCET) Volume 2, Issue 6, June 2013 2054 www.ijarcet.org VII. SIMULATION PARAMETERS AND RESULTS A. Simulation parameters Additive white Gaussian noise channel is used. It is assumed that the channel is not changing during the period of samples. The results are averaged over 1000 tests using Monte Carlo simulations written in MATLAB. Simulation results are taken using MPSK modulated random primary signal and independent and identically distributed (iid) noise sample with Gaussian distribution are used. Three types of signal namely rectangular pulse, raised cosine and root- raised cosine were listed and compared. To find the threshold, we require the probability of false alarm is Pfa 0.1 and probability of detection is Pd 0.9 as required by IEEE 802.22 standard. B. Simulation results Figure 1 shows simulation results of the probability of detection (Pd) when the GA optimized SVD method and SVD method are used for comparison when SNR ranges from -16 dB to -4 dB. From these figures, it can be concluded that the GA optimized SVD based detection gives better results than SVD based detection in low SNR. It can be noticed from the graph that the performance of the SVD method and GA optimized SVD are nearly equal at -6 dB ,while GA optimized SVD shows better results at -16 dB for all the three signals ,rectangular pulse signal, raised cosine and root-raised cosine. Although SVD at certain points better than the GA optimized SVD method for root raised cosine signal, but the overall performance of the detector is better than the SVD method. -16 -14 -12 -10 -8 -6 -4 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 SNR (db) Probabilityofdetection(pd ) Rectangular Pulse SVD GA a) Rectangular pulse signal -16 -14 -12 -10 -8 -6 -4 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 SNR (db) Probabilityofdetection(p d ) Raised Cosine SVD GA b) Raised cosine signal -16 -14 -12 -10 -8 -6 -4 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 SNR (db) Probabilityofdetection(Pd ) Root Raised Cosine SVD GA c) Root- raised cosine signal Figure2: Comparision of Pd between the SVD method and energy detector for (a) Rectangular pulse signal; (b) Raised cosine signal(c) Root-raised cosine signal In terms of performance of the detector, the receiver operating characteristic (ROC) curves are shown in figure2. Both methods were simulated at -16 dB SNR and tested for three types of signal we plot the Pd under H1 against Pfa under Ho when Pfa changes from 0.01 to the desired value of 0.1.It is clearly shown that the ROC curves of the GA optimized based detection are higher than the SVD method which proves the good performance of the detector. 0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08 0.09 0.1 0.1 0.12 0.14 0.16 0.18 0.2 0.22 Probability of false alarm (Pfa ) Probabilityofdetection(Pd ) Rectangular Pulse SVD GA a) Rectangular pulse signal 0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08 0.09 0.1 0.08 0.1 0.12 0.14 0.16 0.18 0.2 0.22 Probability of false alarm (Pfa ) Probabilityofdetection(Pd ) Raised Cosine SVD GA b) Raised cosine signal
  • 4. ISSN: 2278 - 1323 International Journal of Advanced Research in Computer Engineering and Technology (IJARCET) Volume 2, Issue 6, June 2013 2055 www.ijarcet.org 0.01 0.02 0.03 0.04 0.05 0.06 0.07 0.08 0.09 0.1 0.1 0.12 0.14 0.16 0.18 0.2 0.22 Probability of false alarm (Pfa ) Probabilityofdetection(Pd ) Root Raised Cosine SVD GA c) Root-raised cosine signal Figure3: Comparision of ROC curves between SVD method and energy detector for a) Rectangular pulse signal)Raised cosine signal c) Root-raised cosine signal VIII. CONCLUSION In this paper, we implemented a GA optimized SVD- based approach to detect common signals in today’s digital communication system. The rationale of detecting common signals is that, in order for a Cognitive Radio system to operate with an expectable quality of service. The brief simulation results show that GA optimized SVD of the data matrix finds the optimized value of L (no. of column).The method is more robust to numerical errors and very fast. These qualities are desirable in IEEE 802.22 standard since it is easily suited the need to shorten the period of sensing spectrum. . REFERENCES [1] J. Mitola and G. Q. Maguire, “Cognitive radio: making software radios more personal,” Personal Communications, IEEE, vol. 6, no. 4, pp. 13–18, Aug. 1999. [2] S. Haykin, “Cognitive radio: brain-empowered wireless communications,” IEEE Journal on Selected Areas in Communications, vol. 23, no. 2, pp. 201–220, Feb. 2005. [3] S. Xu, Y. Shang, and H. Wang, “Svd based sensing of a wireless microphone signal in cognitive radio networks,” in 11th IEEE Singapore International Conference on Communication Systems, 2008 (ICCS 2008), 2008, pp. 222 –226. [4] T. Yucek and H. Arslan, “A survey of spectrum sensing algorithms for cognitive radio applications,” Communications Surveys Tutorials, IEEE, vol. 11, no. 1, pp. 116 –130, 2009. [5] I. F. Akyildiz, W.-Y. Lee, M. C. Vuran, and S. Mohanty, “NeXt generation/dynamic spectrum access/cognitive radio wireless networks: a survey,” Comput. Netw., vol. 50, no. 13, pp. 2127–2159, 2006 [6] A. Kortun, T. Ratnarajah, M. Sellathurai, and C. Zhong, “On the performance of eigenvalue-based spectrum sensing for cognitive radio,” in New Frontiers in Dynamic Spectrum, 2010 IEEE Symposium on, 2010, pp. 1 –6. [7] S. Leach, “Singular value decomposition – a primer,” Solutions, p. 8, 2000. [Online]. Available:http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2. 6587 [8] Holland, J. 1975. Adaptation in Natural and Artificial Systems. University of Michigan Press [9] Beibei Wang and K. J. Ray Liu, “Advances in Cognitive Radio Networks: A Survey,” in IEEE journal of selected topics in signal processing,vol.5,no.1,February 2011,pp.5-23. [10] A. Sahai and D. Cabric, “Spectrum sensing: Fundamental limits and practical challenges,” in IEEE International Symposium on New Frontiers Dynamic Spectrum Access Networks (DySPAN), November 2005, Baltimore, MD. [11] D. Tufts and R. Kumaresan, “Singular value decomposition and improved frequency estimation using linear prediction,” Acoustics, Speech and Signal Processing, IEEE Transactions on, vol. 30, no. 4, pp. 671 – 675, Aug.. [12] 1982Y. Zeng and Y.-C. Liang, “Maximum-minimum eigenvalue detection for cognitive radio,” in IEEE 18th International Symposium on Personal, Indoor and Mobile Radio Communications PIMRC 2007., 2007, pp. 1 –5 [13] Sapna Katiyar, A Comparative Study of Genetic Algorithm and the Particle Swarm Optimization,” A.B.E.S. Institute of Technology, Ghaziabad [14] I. M. Johnstone, “On the distribution of the largest eigenvalue in principal components analysis,” Annals of Statistics, vol. 29, no. 2, pp. 295–327, 2001. [15] C. A. Tracy and H. Widom, The distribution of the largest eigenvalue in the Gaussian ensembles, ser. CRM Series in Mathematical Physics 4. New York: Springer-Verlag, 2000, pp. 641–472.