SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
ISSN: 2278 – 1323
                                               International Journal of Advanced Research in Computer Engineering & Technology
                                                                                                    Volume 1, Issue 5, July 2012



  Interference Mitigation by CDMA RAKE Receiver
         With Walsh-Hadamard Sequence
      Braj Bhooshan Pandey                                                              Prof. Abhishek Choubey

    Research Scholar, M.E.                                                  Head, Department of Electronics and comm.
  R.K.D.F. Institute of Science &                                              R.K.D.F. Institute of Science &
      Technology, Bhopal                                                             Technology, Bhopal
        Bhopal, INDIA                                                                 Bhopal, INDIA
pandey_023brajbhooshan@yahoo.com                                              abhishekchoubey84@gmail.com




Abstract- Currently, a global third generation cellular system         flexible voice and multi data service. In America the
based on CDMA is being developed with a wider bandwidth                second generation system (2G) DS-CDMA standard IS-
than existing second generation system. The RAKE Receiver              95 is being used as a basis for third generation system
instead of completely eliminating multipath uses techniques            (3G) with wider bandwidth.
to effectively utilize multipath to produce the desired signal.
                                                                       The purpose of this paper to design and implementation
This paper proposes interference mitigation by CDMA
                                                                       of CDMA RAKE Receiver over the conventional
RAKE receiver with Walsh- Hadamard Sequence for DS-
CDMA systems. In CDMA RAKE receiver multiple                           CDMA Receiver in wireless communication and to
correlator are used to dispread the multipath signals and              achieve a better Bit Error Ratio (BER). CDMA RAKE
before making a bit decision alignment and combination of              Receiver consists of many correlators that correlate to
those signal are necessary. Proposing aim of the study are-            spread signals. The simple RAKE Receiver structure is
1)Design and Implementation of CDMA RAKE Receiver 2)                   used in which despread values produced by RAKE
Implementation of Walsh-Hadamard sequence 3) Receiver                  “finger” and then combined to generate a decision
structure is that it requires multiple correlators and to achieve      statistics. In order to mitigate the multipath fading a
better Bit Error Ratio(BER).
                                                                       diversity receiver is used in the DS-CDMA systems.
Index Terms – Code Division Multiple Access (CDMA),                    The RAKE receiver uses the maximum ratio combining
RAKE Receiver, Interference Suppression, Walsh-Hadamard                and multiuser interference suppression to get a
Sequence, Correlators, Maximum Ration Combining (MRC),                 considerable increase in performance and analysis of
                                                                       DS-CDMA system. Multipath fading is one of the
                                                                       major practical concerns in wireless communications.
 I.        INTRODUCTION                                                The RAKE Receiver has been used to reduce the
Wireless Communication has made a huge leap since its                  multipath fading in DS-CDMA system. In order to
first    commercial     service.     In    the    wireless             mitigate the multipath fading a diversity receiver is
communication, transmitted signals arrive at the                       used in the DS-CDMA systems in which considerable
receiver via a direct, unobstructed path or via multiple               gain is achieves by the combination of multipath signal
paths from the reflection, diffraction and scattering of               with the different delays and that is known as RAKE
surrounding objects such as buildings and trees. This                  “finger” Receiver. Finally we will see that in our
multipath propagation causes the signal at the receiver                proposing work CDMA RAKE Receiver is better
to distort and fade significantly leading to inter-symbol              performer over the Conventional CDMA Receiver and
interference (ISI). A Conventional CDMA Receiver                       achieve better Bit Error Ratio (BER).
ignores the multipath component and concentrates
on the direct line of sights components. As Customer
Demand for wireless communication continues to grow.
We got third generation (3G) cellular mobile
communication systems are being capable to provide



                                                                                                                                 60
                                                   All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                     International Journal of Advanced Research in Computer Engineering & Technology
                                                                                          Volume 1, Issue 5, July 2012

                                                                                             𝑵−𝟏
                                                                                      c(t) = 𝒌=𝟎 𝒄 𝒌 p(t-kTC ),                  (1)
II SYSTEM DESCRIPTION ALONG WITH                                                      0≤ 𝒕 < 𝑻 𝒃 = NTc
CONVENTIONAL CDMA RECEIVER
                                                                       With ck = +1,-1 and p(t) is a rectangular pulse of
                                                                      duration Tc and unit amplitude
In the previous time single user detection methods have
been developed which model interference in a similar                   The transmitted signal of user k can be expressed as,
way after that proposed a CDMA receiver. In CDMA
system many user transmit information simultaneously.                                                      ∞
                                                                               xk(t) =       𝑬𝑲         𝒊=−∞     𝒔 𝑲 (i) 𝒂 𝒌 ,i(t-IT) (2)
In CDMA system each user has a unique code because
of it is known as code division multiple access
techniques. User sends many information in the form of                Where Ek is the average symbol energy and T is symbol
images, data message, audio, video etc. The                           duration.
communication system as in fig.1
                                                                      The spreading waveform for the kth user,
                                                                                                𝟏         𝑵−𝟏
                                                                                 ak, i(t) =              𝑱=𝟎    𝒄 𝒌,𝒊 (j) p(t-jTC) (3)
                                                                                                    𝑵


                                                                      The received signal can be obtained as,
                                                                                𝑳−𝟏                             𝑲−𝟏    𝑳−𝟏
                                                                      r(t) =   𝒊=𝟎    𝒈𝒍𝒙 𝟎 (t- 𝑻 𝒍 ) +      𝒈𝒍𝒙 𝒌 (t-Tl)+ n(t)
                                                                                                                𝒌=𝟏   𝒍=𝟎
                                                                                                                    (4)
                                                                      Transmitted signals propagated through a radio channel
                                                                      are affected by fading. Two major physical factors that
                                                                      influence the fading are multipath propagation and the
                                                                      Two major physical factors that influence the fading are
                                                                      multipath propagation and the a constantly changing
                                                                      environment that dissipates the signal energy in
                                                                      amplitude, phase, and time. The relative motion
                                                                      between the base station and the mobile results in a
                                                                      frequency modulation due to different Doppler shifts on
            Fig no.1 System Model
                                                                      each of the multipath components [Rap96].At the
                                                                      receiver front end, the additive white Gaussian noise
In DS-Spread Spectrum, each user is assigned a unique                 (AWGN) is introduced by the thermal noise of the
Walsh code and transmitted data is multiplied by its                  electric components of the receiver.
corresponding spreading code. Modulated data through
the spread code occupies more bandwidth than
transmitted data.
           One of the most important limitations in the field of
digital communications is channel capacity. Cause of this,
many methods has been designed to goal the usage of a
channel in the most efficient way. For cellular mobile
communications the most relevant method is multiple
accesses techniques. This method allows us to transmit and
receive information from different sources through the same
channel. So, many users can communicate using the same
channel. Some of the multiple access methods are Time-
Division Multiple Access (TDMA), Frequency-Division
Multiple Access (FDMA), and Code-Division Multiple
Access (CDMA). There are two types of CDMA. The first is
Frequency-Hopping (FH-CDMA), and the second is direct
sequence (DS-CDMA).
Each user’s data sequence is first modulated using QPSK
modulation. Each user within a cell is assigned a unique code
signal c(t) called spreading or Walsh-Hadamard code, which                 Fig no.2 Channel model for simulation
is then used to spread the QPSK-modulated signal using
direct sequence CDMA (DS-CDMA).

After mapping the Walsh-Hadamard code takes the
form
                                                                                                                                            61
                                                 All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                   International Journal of Advanced Research in Computer Engineering & Technology
                                                                                        Volume 1, Issue 5, July 2012

Figure no.2 shows the channel model with four
multipaths, which is used for simulation of our rake
receiver. The transmitted signal propagates through
four different time variant channels and produces four
                                                                    The most well-known approach to deal with multipath
multipaths. The rake receiver receives the multipath
signals added with AWGN.                                            wireless channels is to use RAKE receivers, as
                                                                    implemented successfully in the “traditional” wideband
  III. Proposed model                                               CDMA systems. Therefore, it is straightforward to
   A. Receiver Structure                                            apply this concept for channel estimation in IR-UWB.
The receiver design should aim the recovery of data                 Basically, a RAKE receiver consists of multiple
from a multipath environment. The most commonly                     correlators (also called RAKE fingers). Each finger
adopted receiver architecture a multipath environment
                                                                    matches (correlates) the received pulse sequence
is a rake receiver shown in Figure3.
                                                                    (spread
                                                                    by the multipath channel) with a delayed version of a
                                                                    template pulse g(t-τn).The correlator’s output is an
                                                                    estimate of the amplitude an of the corresponding
                                                                    channel tap (from eq.5).

                                                                    transmitted over a multipath channel then the received
                                                                    signal is,
                                                                    r(t) = ∈ ∞ 𝒔 𝒊 𝑵 𝒇 𝒄 𝒊 h(t-ItF) + n(t)
                                                                                 𝒊=𝟎                                (6)



                                                                     Where n(t) is additive noise , h(t) is the composite
                                                                    channel response h(t)= hp(t)*g(t).
                  Conventional RAKE Receiver
                                                                                                   ∞
                                                                                     h(t) =        𝒏=𝟎      𝒂 𝒏 g(t- 𝝉 𝒏 )      (7)
A rake receiver has multiple fingers to resolve
multipath component signals that have different path                Matching the received signal with a template pulse,
delays. A finger receives a signal containing all the               which is a delayed copy of the transmitted pulse g(t),
multiple paths then processes one of the multipath                  the correlator’s output for a RAKE finger
component signals assigned to it. Each multipath has a              corresponding to the multipath component at τn delay
different distortion, diffraction, scattering, reflection etc       in the i-th frame will be,
that is mainly caused by the Rayleigh fading, AWGN,
                                                                        x i, n =    𝒓 𝒕 𝒈(𝒕 − 𝒊𝑻 𝒇− 𝝉 𝒏 ) 𝒅𝒕                     (8)
and the frequency offset between the source and the
destination site. Therefore, the received signal of a
finger should undergo phase alignment and frequency                 =        ∈ 𝒔𝒊    𝑵𝒇    𝒄 𝒊 𝒉 𝒕 − 𝒊𝑻 𝒇 𝒈 𝒕 − 𝒊𝑻 𝒇 − 𝝉 𝒏 𝒅𝒕 + 𝒏,𝒊𝒏
offset alignment specific to the multipath as well as the                                                                       (9)
despreading process. A power channel estimator
                                                                                   ∞
measures the signal power of the multipath to determine              h(t) =        𝒏=𝟎     𝒂 𝒏 g(t- 𝝉 𝒏 )                       (10)
if it is strong enough to be considerable. The deskewer
compensates individual multipath delays. After these
processes the multipathpath signals are combined to                  =        ∈ 𝒔𝒊    𝑵𝒇   𝒄 𝒊 𝒂, 𝒏 + 𝒏, (t)                    (11)
recover the desired data .Let hp(t) be the (physical)
multipath channel impulse response. Channel models                  The RAKE receiver is a matched filter (the received
                                                                    pulse is matched with a template that has the same
proposed by IEEE 802.15.3a Task Group [28, 52] are
                                                                    waveform) and therefore (with known channel
based on the famous multipath Saleh-Valenzuela                      coefficients) optimum with respect to the BER
model [58], in which the multipath components arrive                performance, and it also benefits from the fact that
at the receiver in clusters,                                        many results in existing literature on RAKE receivers
                                                                    for wireless communication systems e.g. WCDMA can
                                                                    still apply. However, there are some serious practical
       x i, n =   𝒓 𝒕 𝒈(𝒕 − 𝒊𝑻 𝒇− 𝝉 𝒏 ) 𝒅𝒕          (5)             issues in this kind of receiver.

                                                                                                                                   62
                                               All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                                 International Journal of Advanced Research in Computer Engineering & Technology
                                                                                      Volume 1, Issue 5, July 2012


                                                                                    𝑴
B.Walsh-Hadmard sequence-                                                    x/=    𝒌=𝟏   𝜷𝒌 ∗ 𝒙𝒌                           (13)

Basically for spreading data we used different types of
sequence so we have P-N sequence and Walsh –                        IV PERFOMANCE ANALYSIS
Hadmard sequence but in this paper for spreading data
                                                                    The standard Gaussian approximation regarding fading is
and also for better orthogonally we used Walsh-
                                                                    used with a signal to noise ratio analysis to derive the Bit
Hadamard sequence so that sequence also called
                                                                    error ratio for QPSK modulation and we have specific
orthogonal code. For improving better efficiency we
                                                                    weighted vector ω then the signal to noise ratio at the output
used orthogonal function or Walsh-Hadmard
Orthogonal sequence. For generating Walsh-Hadmard                   of the maximum ratio combiner can be easily shown a
sequence we have NxN square matrix. To get the                             SNR = ωK ggk ω / ωK kω                          (14)
desired length of Hadamard matrix can be generated by
the following manner-                                               Power spectral density of total noise after that Bit Error Ratio
                                                                    can be written as,
       𝟏    𝟏
𝑯𝟏 =                                                                       Pe(d) =½erfc(rootof(β SNR(C))                    (15)
       𝟏   −𝟏
                                     𝑯𝑵              𝑯𝑵
            𝑯  𝑯                          𝟐               𝟐
𝑯𝑵 =                      𝑯𝟏 =
            𝑯 −𝑯                     𝑯𝑵         −𝑯 𝑵
                                          𝟐                   𝟐      V. RESULT AND DISCUSSION
Spreading sequence used for DS-CDMA system can be                   QPSK modulation is a technique that will modulate the
represented by JxK matrices BJK. Where J is the                     transnitted signal and used for the simulations or spread
number of sequence and K is sequence code length.                   with the spreading code sequence. Impulse response
The code sequence is known as orthogonalSequence if,                channel measurement is also utilized in which
and only if matrix BJK is orthogonal –
                                                                    multipath components are generated through Rayleigh
        BJK BJKT = k IM                       (12)
                                                                    fading channel characteristics. Channel noise is
                                                                    generated and added to the multipath components. So
Where k is the constant and BJKT is transposition of                all the multipath components are added together for
matrix BJK of order N and IN is the NxN unity matrix. In            simulation at the receiver site. Integration process can
the DS-CDMA system the number of chips per data
                                                                    take place after the multipath components is detected
symbol is known as spreading factor (SF).
                                                                    after that Maximum ratio combining can be used for
C Maximal Ratio Combining (Combining weight                         storing the integration results here combining result of
coefficient and finger delay)                                       multipath components to send for the decision bit
                                                                    device after all data is decoded and probability of error
In the field of wireless communication we have much                 is computed and simulation have run with the Walsh-
option to mitigate interference such as ISI, Equalizers             Hadamard sequence. The purpose of this paper to
and diversity. Diversity is techniques that will reduce
                                                                    design and implementation of CDMA RAKE Receiver
amplitude fluctuation or fading mitigation. We have
many type of diversity such as Antenna diversity,                   over the conventional CDMA Receiver in wireless
feedback diversity, Scanning diversity, Maximum ratio               communication and to achieve a better Bit Error Ratio
combining, Equal gain combining, etc. MRC is the                    (BER). CDMA RAKE Receiver consists of many
optimist form of diversity combining cause of                       correlators that correlate to spread signals. Multipath
Maximum ratio combining all the integration result of               fading is one of the major practical concerns in wireless
code sequence by this we achieve better bit error ratio
                                                                    communications.
(BER) and maximum signal to noise ratio (SNR).
                                                                    Finally, We will see that signal to noise ratio(SNR) and
In Maximum ratio combining all integrated multipath                 bit error ratio (BER)graph comparison between CDMA
components such as x1(t), x2(t), x3(t),………. xn(t) So                receiver and CDMA RAKE receiver-
whole of components are multiplied with
complex conjugate weighted β1*(t),β2*(t),
β3*(t)…… βn*(t) of channel characteristics. Then


mathematical expression of the MRC can be written as-


                                                                                                                                   63
                                               All Rights Reserved © 2012 IJARCET
ISSN: 2278 – 1323
                        International Journal of Advanced Research in Computer Engineering & Technology
                                                                             Volume 1, Issue 5, July 2012

                                                       VI. CONCLUSION
                                                      Interference Mitigation by CDMA RAKE receiver with
                                                      Walsh-Hadamard sequence as the spreading code has
                                                      been introduced. We found that Conventional RAKE
                                                      receiver gives the better performance in comparison
                                                      with the conventional CDMA receiver in respect of
                                                      system efficiency, SNR and BER preformance.In the
                                                      proposed model each multipath component signal
                                                      correlate with each other so that is big advantages cause
                                                      of multiple code generators running continuously. So
                                                      that proposed model with Walsh-Hadamard sequence
                                                      gives an considerable result as compared to
                                                      conventional CDMA receiver.

     CDMA Receiver (plot SNR b/w BER)
                                                                               VII. REFERRENCE
                                                      [1] L. Harju et. al., “A Flexible RAKE Receiver Architecture for
                                                          WCDMA Mobile Terminals,” for SPAWC ’01, Taoyuan, Taiwan,
                                                          Mar. 2001, pp.9-12.

                                                      [2] J.G. Proakis, Digital Communication", McGRAW-HILL.

                                                      [3] T.S. Rappaport, Wireless Communications Principles and
                                                           Practice", Prentice Hall

                                                      [4] A.J. Viterbi, CDMA Principles of Spread Spectrum
                                                          Communication",ADDISONWESLEYCOMPANY .

                                                      [5] B. J. Wysocki and T. A. Wysocki, “Orthogonal Binary Sequences
                                                           with Wide Range of Correlation Properties,” for ISCTA’01, .
                                                          Ambleside, U.K., July 2001, pp. 483-485

                                                      [6] . Cheng and C. Beaulieu, “Accurate DS-CDMA Bit-Error
                                                           Probability Calculation in Rayleigh Fading,” IEEE Trans.
                                                          Wireless Commun., vol.1, no. 1, pp. 3-15, Jan. 2002.
    CDMA RAKE Receiver (plot SNR b/w BER)
                                                      [7] M. F. Madkour, S. C. Gupta and E. Wang, “Successive
                                                          interference cancellation Algorithms for Downlink W-CDMA
                                                           Communications,” IEEE Trans. Wireless Commu., vol. 1, no. 1,
                                                          January 2002

                                                      [8] S.Mudulodu, G. Leus, and A. Paul raj, “An interference
                                                          suppressing RAKE receiver for the CDMA downlink," IEEE
                                                          Sig.Proc. Lett., vol.11, pp. 521-524, May 2004

                                                      [9] M. Uzzafer, “Single Correlator Receiver for Wideband MultiPath
                                                         Channel, “in Proc. IEEE 6th CAS Symp., Shanghai, vol. 2, June.
                                                        2004, pp.421-424

                                                      [10] F. Adachi et. al., “Broadband CDMA Techniques,” IEEE
                                                           Wireless communications, vol. 12, no. 2, pp. 8-18, Apr. 2005

                                                      [11] M. Ali Akbar, Hamza Bin Tila, M. Zulkifl Khalid and
                                                           Muhammad Asim Ajaz ―Bit Error Rate Improvement using
                                                           ESPRIT based Beam forming and RAKE receiver‖, 978-14244-
                                                          4873-9/09/©2009 IEEE

                                                      [12] R. Fantacci et. al., “Perspectives for Present and Future CDMA-
                                                           based Communications,” IEEE commun. Magazine, vol. 43, no.
                                                           2, pp. 95-100,Feb. 2005.

                                                      [13] R. Fantacci et. al., “Perspectives for Present and Future
                                                          CDMAbased Communications,” IEEE commun. Magazine, vol.
Comparison b/w different type of combining                43, no. 2, pp. 95-100,Feb. 2005.
techniques (CDMA RAKE RECEIVER)

                                                                                                                          64
                                 All Rights Reserved © 2012 IJARCET

Contenu connexe

Tendances

AGPM: An Authenticated Secure Group Communication Protocol for MANETs
AGPM: An Authenticated Secure Group Communication Protocol for MANETsAGPM: An Authenticated Secure Group Communication Protocol for MANETs
AGPM: An Authenticated Secure Group Communication Protocol for MANETsIDES Editor
 
A robust audio watermarking in cepstrum domain composed of sample's relation ...
A robust audio watermarking in cepstrum domain composed of sample's relation ...A robust audio watermarking in cepstrum domain composed of sample's relation ...
A robust audio watermarking in cepstrum domain composed of sample's relation ...ijma
 
11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...Alexander Decker
 
Design and implemation of an enhanced dds based digital
Design and implemation of an enhanced dds based digitalDesign and implemation of an enhanced dds based digital
Design and implemation of an enhanced dds based digitalManoj Kollam
 
Extending soundcard
Extending soundcardExtending soundcard
Extending soundcarddimitar53
 
Cooperative Communication for a Multiple-Satellite Network
Cooperative Communication for a Multiple-Satellite NetworkCooperative Communication for a Multiple-Satellite Network
Cooperative Communication for a Multiple-Satellite Networkchiragwarty
 
Cooperative Diversity - An Introduction to Cooperative Comm
Cooperative Diversity - An Introduction to Cooperative CommCooperative Diversity - An Introduction to Cooperative Comm
Cooperative Diversity - An Introduction to Cooperative CommAshish Meshram
 
Spectrally efficient multicarrier modulation system for visible light communi...
Spectrally efficient multicarrier modulation system for visible light communi...Spectrally efficient multicarrier modulation system for visible light communi...
Spectrally efficient multicarrier modulation system for visible light communi...IJECEIAES
 
Chapter 10.slides
Chapter 10.slidesChapter 10.slides
Chapter 10.slideslara_ays
 
Power Designation for Noma Based Multi Client Mimo Frameworks Using Secure Le...
Power Designation for Noma Based Multi Client Mimo Frameworks Using Secure Le...Power Designation for Noma Based Multi Client Mimo Frameworks Using Secure Le...
Power Designation for Noma Based Multi Client Mimo Frameworks Using Secure Le...Associate Professor in VSB Coimbatore
 
Security performance analysis for power domain NOMA employing in cognitive ra...
Security performance analysis for power domain NOMA employing in cognitive ra...Security performance analysis for power domain NOMA employing in cognitive ra...
Security performance analysis for power domain NOMA employing in cognitive ra...journalBEEI
 
The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...
The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...
The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...amal algedir
 
Multi User Detection in CDMA System Using Linear and Non Linear Detector
Multi User Detection in CDMA System Using Linear and Non Linear DetectorMulti User Detection in CDMA System Using Linear and Non Linear Detector
Multi User Detection in CDMA System Using Linear and Non Linear DetectorWaqas Tariq
 
Artificial Intelligence Based Mutual Authentication Technique with Four Entit...
Artificial Intelligence Based Mutual Authentication Technique with Four Entit...Artificial Intelligence Based Mutual Authentication Technique with Four Entit...
Artificial Intelligence Based Mutual Authentication Technique with Four Entit...IDES Editor
 

Tendances (19)

AGPM: An Authenticated Secure Group Communication Protocol for MANETs
AGPM: An Authenticated Secure Group Communication Protocol for MANETsAGPM: An Authenticated Secure Group Communication Protocol for MANETs
AGPM: An Authenticated Secure Group Communication Protocol for MANETs
 
A robust audio watermarking in cepstrum domain composed of sample's relation ...
A robust audio watermarking in cepstrum domain composed of sample's relation ...A robust audio watermarking in cepstrum domain composed of sample's relation ...
A robust audio watermarking in cepstrum domain composed of sample's relation ...
 
11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...11.design and implementation of distributed space frequency to achieve cooper...
11.design and implementation of distributed space frequency to achieve cooper...
 
G0361052058
G0361052058G0361052058
G0361052058
 
Design and implemation of an enhanced dds based digital
Design and implemation of an enhanced dds based digitalDesign and implemation of an enhanced dds based digital
Design and implemation of an enhanced dds based digital
 
Extending soundcard
Extending soundcardExtending soundcard
Extending soundcard
 
Module 5 2010
Module 5 2010Module 5 2010
Module 5 2010
 
Cooperative Communication for a Multiple-Satellite Network
Cooperative Communication for a Multiple-Satellite NetworkCooperative Communication for a Multiple-Satellite Network
Cooperative Communication for a Multiple-Satellite Network
 
J010234960
J010234960J010234960
J010234960
 
Cooperative Diversity - An Introduction to Cooperative Comm
Cooperative Diversity - An Introduction to Cooperative CommCooperative Diversity - An Introduction to Cooperative Comm
Cooperative Diversity - An Introduction to Cooperative Comm
 
Spectrally efficient multicarrier modulation system for visible light communi...
Spectrally efficient multicarrier modulation system for visible light communi...Spectrally efficient multicarrier modulation system for visible light communi...
Spectrally efficient multicarrier modulation system for visible light communi...
 
Chapter 10.slides
Chapter 10.slidesChapter 10.slides
Chapter 10.slides
 
Power Designation for Noma Based Multi Client Mimo Frameworks Using Secure Le...
Power Designation for Noma Based Multi Client Mimo Frameworks Using Secure Le...Power Designation for Noma Based Multi Client Mimo Frameworks Using Secure Le...
Power Designation for Noma Based Multi Client Mimo Frameworks Using Secure Le...
 
Security performance analysis for power domain NOMA employing in cognitive ra...
Security performance analysis for power domain NOMA employing in cognitive ra...Security performance analysis for power domain NOMA employing in cognitive ra...
Security performance analysis for power domain NOMA employing in cognitive ra...
 
The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...
The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...
The Coexistence of Device -to- Device (D2D) Communication under Heterogeneous...
 
Ck25516520
Ck25516520Ck25516520
Ck25516520
 
Multi User Detection in CDMA System Using Linear and Non Linear Detector
Multi User Detection in CDMA System Using Linear and Non Linear DetectorMulti User Detection in CDMA System Using Linear and Non Linear Detector
Multi User Detection in CDMA System Using Linear and Non Linear Detector
 
Artificial Intelligence Based Mutual Authentication Technique with Four Entit...
Artificial Intelligence Based Mutual Authentication Technique with Four Entit...Artificial Intelligence Based Mutual Authentication Technique with Four Entit...
Artificial Intelligence Based Mutual Authentication Technique with Four Entit...
 
201 209
201 209201 209
201 209
 

En vedette

A Challenge to Analyze and Detect Altered Human Fingerprints
A Challenge to Analyze and Detect Altered Human FingerprintsA Challenge to Analyze and Detect Altered Human Fingerprints
A Challenge to Analyze and Detect Altered Human FingerprintsIOSR Journals
 
Sem 27 02 09 2
Sem 27 02 09 2Sem 27 02 09 2
Sem 27 02 09 2Olga92
 
Inclusion For PSA
Inclusion For PSAInclusion For PSA
Inclusion For PSAbudman22
 
Ijarcet vol-2-issue-4-1383-1388
Ijarcet vol-2-issue-4-1383-1388Ijarcet vol-2-issue-4-1383-1388
Ijarcet vol-2-issue-4-1383-1388Editor IJARCET
 
Chapter 1 Slideshow 1
Chapter 1 Slideshow 1Chapter 1 Slideshow 1
Chapter 1 Slideshow 1Caleb Helton
 

En vedette (8)

Kaplan university 1
Kaplan university 1Kaplan university 1
Kaplan university 1
 
A Challenge to Analyze and Detect Altered Human Fingerprints
A Challenge to Analyze and Detect Altered Human FingerprintsA Challenge to Analyze and Detect Altered Human Fingerprints
A Challenge to Analyze and Detect Altered Human Fingerprints
 
Sem 27 02 09 2
Sem 27 02 09 2Sem 27 02 09 2
Sem 27 02 09 2
 
Inclusion For PSA
Inclusion For PSAInclusion For PSA
Inclusion For PSA
 
(2009) Comparison Of Fingerprint Image Quality And Matching
(2009) Comparison Of Fingerprint Image Quality And Matching(2009) Comparison Of Fingerprint Image Quality And Matching
(2009) Comparison Of Fingerprint Image Quality And Matching
 
Ijarcet vol-2-issue-4-1383-1388
Ijarcet vol-2-issue-4-1383-1388Ijarcet vol-2-issue-4-1383-1388
Ijarcet vol-2-issue-4-1383-1388
 
Chapter 1 Slideshow 1
Chapter 1 Slideshow 1Chapter 1 Slideshow 1
Chapter 1 Slideshow 1
 
1694 1698
1694 16981694 1698
1694 1698
 

Similaire à 60 64

International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER) International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER) ijceronline
 
Implementation of Algorithms For Multi-Channel Digital Monitoring Receiver
Implementation of Algorithms For Multi-Channel Digital Monitoring ReceiverImplementation of Algorithms For Multi-Channel Digital Monitoring Receiver
Implementation of Algorithms For Multi-Channel Digital Monitoring ReceiverIOSR Journals
 
Visible Light Communication
Visible Light CommunicationVisible Light Communication
Visible Light CommunicationIJERD Editor
 
On the Performance Analysis of Multi-antenna Relaying System over Rayleigh Fa...
On the Performance Analysis of Multi-antenna Relaying System over Rayleigh Fa...On the Performance Analysis of Multi-antenna Relaying System over Rayleigh Fa...
On the Performance Analysis of Multi-antenna Relaying System over Rayleigh Fa...IDES Editor
 
Multi user performance on mc cdma single relay cooperative system by distribu...
Multi user performance on mc cdma single relay cooperative system by distribu...Multi user performance on mc cdma single relay cooperative system by distribu...
Multi user performance on mc cdma single relay cooperative system by distribu...IJCNCJournal
 
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...IRJET Journal
 
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...Cemal Ardil
 
Hrishikesh atre resume intern
Hrishikesh atre resume internHrishikesh atre resume intern
Hrishikesh atre resume internhrishikeshatre
 
Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Editor IJARCET
 
Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Editor IJARCET
 
Application of diversity techniques for multi user idma communication system
Application of diversity techniques for multi user idma communication systemApplication of diversity techniques for multi user idma communication system
Application of diversity techniques for multi user idma communication systemAlexander Decker
 
Spectral Efficient IDMA System Using Multi User Detection
Spectral Efficient IDMA System Using Multi User DetectionSpectral Efficient IDMA System Using Multi User Detection
Spectral Efficient IDMA System Using Multi User DetectionIJSTA
 
CDMA Transmitter and Receiver Implementation Using FPGA
CDMA Transmitter and Receiver Implementation Using FPGACDMA Transmitter and Receiver Implementation Using FPGA
CDMA Transmitter and Receiver Implementation Using FPGAIOSR Journals
 
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...IJCSEIT Journal
 
Multiplexing,LAN Cabling,Routers,Core and Distribution Networks
Multiplexing,LAN Cabling,Routers,Core and Distribution NetworksMultiplexing,LAN Cabling,Routers,Core and Distribution Networks
Multiplexing,LAN Cabling,Routers,Core and Distribution NetworksPanimalar Engineering College
 

Similaire à 60 64 (20)

461 470
461 470461 470
461 470
 
Ed36788792
Ed36788792Ed36788792
Ed36788792
 
International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER) International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER)
 
Implementation of Algorithms For Multi-Channel Digital Monitoring Receiver
Implementation of Algorithms For Multi-Channel Digital Monitoring ReceiverImplementation of Algorithms For Multi-Channel Digital Monitoring Receiver
Implementation of Algorithms For Multi-Channel Digital Monitoring Receiver
 
Visible Light Communication
Visible Light CommunicationVisible Light Communication
Visible Light Communication
 
On the Performance Analysis of Multi-antenna Relaying System over Rayleigh Fa...
On the Performance Analysis of Multi-antenna Relaying System over Rayleigh Fa...On the Performance Analysis of Multi-antenna Relaying System over Rayleigh Fa...
On the Performance Analysis of Multi-antenna Relaying System over Rayleigh Fa...
 
Multi user performance on mc cdma single relay cooperative system by distribu...
Multi user performance on mc cdma single relay cooperative system by distribu...Multi user performance on mc cdma single relay cooperative system by distribu...
Multi user performance on mc cdma single relay cooperative system by distribu...
 
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
 
B04420812
B04420812B04420812
B04420812
 
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
An investigation-on-efficient-spreading-codes-for-transmitter-based-technique...
 
Hrishikesh atre resume intern
Hrishikesh atre resume internHrishikesh atre resume intern
Hrishikesh atre resume intern
 
Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377
 
Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377Ijarcet vol-2-issue-7-2374-2377
Ijarcet vol-2-issue-7-2374-2377
 
Slides-ICISS.ppt
Slides-ICISS.pptSlides-ICISS.ppt
Slides-ICISS.ppt
 
Application of diversity techniques for multi user idma communication system
Application of diversity techniques for multi user idma communication systemApplication of diversity techniques for multi user idma communication system
Application of diversity techniques for multi user idma communication system
 
Spectral Efficient IDMA System Using Multi User Detection
Spectral Efficient IDMA System Using Multi User DetectionSpectral Efficient IDMA System Using Multi User Detection
Spectral Efficient IDMA System Using Multi User Detection
 
CDMA Transmitter and Receiver Implementation Using FPGA
CDMA Transmitter and Receiver Implementation Using FPGACDMA Transmitter and Receiver Implementation Using FPGA
CDMA Transmitter and Receiver Implementation Using FPGA
 
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...
 
Multiplexing,LAN Cabling,Routers,Core and Distribution Networks
Multiplexing,LAN Cabling,Routers,Core and Distribution NetworksMultiplexing,LAN Cabling,Routers,Core and Distribution Networks
Multiplexing,LAN Cabling,Routers,Core and Distribution Networks
 
CDMA Introducton
CDMA IntroductonCDMA Introducton
CDMA Introducton
 

Plus de Editor IJARCET

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationEditor IJARCET
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Editor IJARCET
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Editor IJARCET
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Editor IJARCET
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Editor IJARCET
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Editor IJARCET
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Editor IJARCET
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Editor IJARCET
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Editor IJARCET
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Editor IJARCET
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Editor IJARCET
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Editor IJARCET
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Editor IJARCET
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Editor IJARCET
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Editor IJARCET
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Editor IJARCET
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Editor IJARCET
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Editor IJARCET
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Editor IJARCET
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Editor IJARCET
 

Plus de Editor IJARCET (20)

Electrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturizationElectrically small antennas: The art of miniaturization
Electrically small antennas: The art of miniaturization
 
Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207Volume 2-issue-6-2205-2207
Volume 2-issue-6-2205-2207
 
Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199Volume 2-issue-6-2195-2199
Volume 2-issue-6-2195-2199
 
Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204Volume 2-issue-6-2200-2204
Volume 2-issue-6-2200-2204
 
Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194Volume 2-issue-6-2190-2194
Volume 2-issue-6-2190-2194
 
Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189Volume 2-issue-6-2186-2189
Volume 2-issue-6-2186-2189
 
Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185Volume 2-issue-6-2177-2185
Volume 2-issue-6-2177-2185
 
Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176Volume 2-issue-6-2173-2176
Volume 2-issue-6-2173-2176
 
Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172Volume 2-issue-6-2165-2172
Volume 2-issue-6-2165-2172
 
Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164Volume 2-issue-6-2159-2164
Volume 2-issue-6-2159-2164
 
Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158Volume 2-issue-6-2155-2158
Volume 2-issue-6-2155-2158
 
Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154Volume 2-issue-6-2148-2154
Volume 2-issue-6-2148-2154
 
Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147Volume 2-issue-6-2143-2147
Volume 2-issue-6-2143-2147
 
Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124Volume 2-issue-6-2119-2124
Volume 2-issue-6-2119-2124
 
Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142Volume 2-issue-6-2139-2142
Volume 2-issue-6-2139-2142
 
Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138Volume 2-issue-6-2130-2138
Volume 2-issue-6-2130-2138
 
Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129Volume 2-issue-6-2125-2129
Volume 2-issue-6-2125-2129
 
Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118Volume 2-issue-6-2114-2118
Volume 2-issue-6-2114-2118
 
Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113Volume 2-issue-6-2108-2113
Volume 2-issue-6-2108-2113
 
Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107Volume 2-issue-6-2102-2107
Volume 2-issue-6-2102-2107
 

Dernier

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Dernier (20)

"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

60 64

  • 1. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 Interference Mitigation by CDMA RAKE Receiver With Walsh-Hadamard Sequence Braj Bhooshan Pandey Prof. Abhishek Choubey Research Scholar, M.E. Head, Department of Electronics and comm. R.K.D.F. Institute of Science & R.K.D.F. Institute of Science & Technology, Bhopal Technology, Bhopal Bhopal, INDIA Bhopal, INDIA pandey_023brajbhooshan@yahoo.com abhishekchoubey84@gmail.com Abstract- Currently, a global third generation cellular system flexible voice and multi data service. In America the based on CDMA is being developed with a wider bandwidth second generation system (2G) DS-CDMA standard IS- than existing second generation system. The RAKE Receiver 95 is being used as a basis for third generation system instead of completely eliminating multipath uses techniques (3G) with wider bandwidth. to effectively utilize multipath to produce the desired signal. The purpose of this paper to design and implementation This paper proposes interference mitigation by CDMA of CDMA RAKE Receiver over the conventional RAKE receiver with Walsh- Hadamard Sequence for DS- CDMA systems. In CDMA RAKE receiver multiple CDMA Receiver in wireless communication and to correlator are used to dispread the multipath signals and achieve a better Bit Error Ratio (BER). CDMA RAKE before making a bit decision alignment and combination of Receiver consists of many correlators that correlate to those signal are necessary. Proposing aim of the study are- spread signals. The simple RAKE Receiver structure is 1)Design and Implementation of CDMA RAKE Receiver 2) used in which despread values produced by RAKE Implementation of Walsh-Hadamard sequence 3) Receiver “finger” and then combined to generate a decision structure is that it requires multiple correlators and to achieve statistics. In order to mitigate the multipath fading a better Bit Error Ratio(BER). diversity receiver is used in the DS-CDMA systems. Index Terms – Code Division Multiple Access (CDMA), The RAKE receiver uses the maximum ratio combining RAKE Receiver, Interference Suppression, Walsh-Hadamard and multiuser interference suppression to get a Sequence, Correlators, Maximum Ration Combining (MRC), considerable increase in performance and analysis of DS-CDMA system. Multipath fading is one of the major practical concerns in wireless communications. I. INTRODUCTION The RAKE Receiver has been used to reduce the Wireless Communication has made a huge leap since its multipath fading in DS-CDMA system. In order to first commercial service. In the wireless mitigate the multipath fading a diversity receiver is communication, transmitted signals arrive at the used in the DS-CDMA systems in which considerable receiver via a direct, unobstructed path or via multiple gain is achieves by the combination of multipath signal paths from the reflection, diffraction and scattering of with the different delays and that is known as RAKE surrounding objects such as buildings and trees. This “finger” Receiver. Finally we will see that in our multipath propagation causes the signal at the receiver proposing work CDMA RAKE Receiver is better to distort and fade significantly leading to inter-symbol performer over the Conventional CDMA Receiver and interference (ISI). A Conventional CDMA Receiver achieve better Bit Error Ratio (BER). ignores the multipath component and concentrates on the direct line of sights components. As Customer Demand for wireless communication continues to grow. We got third generation (3G) cellular mobile communication systems are being capable to provide 60 All Rights Reserved © 2012 IJARCET
  • 2. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 𝑵−𝟏 c(t) = 𝒌=𝟎 𝒄 𝒌 p(t-kTC ), (1) II SYSTEM DESCRIPTION ALONG WITH 0≤ 𝒕 < 𝑻 𝒃 = NTc CONVENTIONAL CDMA RECEIVER With ck = +1,-1 and p(t) is a rectangular pulse of duration Tc and unit amplitude In the previous time single user detection methods have been developed which model interference in a similar The transmitted signal of user k can be expressed as, way after that proposed a CDMA receiver. In CDMA system many user transmit information simultaneously. ∞ xk(t) = 𝑬𝑲 𝒊=−∞ 𝒔 𝑲 (i) 𝒂 𝒌 ,i(t-IT) (2) In CDMA system each user has a unique code because of it is known as code division multiple access techniques. User sends many information in the form of Where Ek is the average symbol energy and T is symbol images, data message, audio, video etc. The duration. communication system as in fig.1 The spreading waveform for the kth user, 𝟏 𝑵−𝟏 ak, i(t) = 𝑱=𝟎 𝒄 𝒌,𝒊 (j) p(t-jTC) (3) 𝑵 The received signal can be obtained as, 𝑳−𝟏 𝑲−𝟏 𝑳−𝟏 r(t) = 𝒊=𝟎 𝒈𝒍𝒙 𝟎 (t- 𝑻 𝒍 ) + 𝒈𝒍𝒙 𝒌 (t-Tl)+ n(t) 𝒌=𝟏 𝒍=𝟎 (4) Transmitted signals propagated through a radio channel are affected by fading. Two major physical factors that influence the fading are multipath propagation and the Two major physical factors that influence the fading are multipath propagation and the a constantly changing environment that dissipates the signal energy in amplitude, phase, and time. The relative motion between the base station and the mobile results in a frequency modulation due to different Doppler shifts on Fig no.1 System Model each of the multipath components [Rap96].At the receiver front end, the additive white Gaussian noise In DS-Spread Spectrum, each user is assigned a unique (AWGN) is introduced by the thermal noise of the Walsh code and transmitted data is multiplied by its electric components of the receiver. corresponding spreading code. Modulated data through the spread code occupies more bandwidth than transmitted data. One of the most important limitations in the field of digital communications is channel capacity. Cause of this, many methods has been designed to goal the usage of a channel in the most efficient way. For cellular mobile communications the most relevant method is multiple accesses techniques. This method allows us to transmit and receive information from different sources through the same channel. So, many users can communicate using the same channel. Some of the multiple access methods are Time- Division Multiple Access (TDMA), Frequency-Division Multiple Access (FDMA), and Code-Division Multiple Access (CDMA). There are two types of CDMA. The first is Frequency-Hopping (FH-CDMA), and the second is direct sequence (DS-CDMA). Each user’s data sequence is first modulated using QPSK modulation. Each user within a cell is assigned a unique code signal c(t) called spreading or Walsh-Hadamard code, which Fig no.2 Channel model for simulation is then used to spread the QPSK-modulated signal using direct sequence CDMA (DS-CDMA). After mapping the Walsh-Hadamard code takes the form 61 All Rights Reserved © 2012 IJARCET
  • 3. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 Figure no.2 shows the channel model with four multipaths, which is used for simulation of our rake receiver. The transmitted signal propagates through four different time variant channels and produces four The most well-known approach to deal with multipath multipaths. The rake receiver receives the multipath signals added with AWGN. wireless channels is to use RAKE receivers, as implemented successfully in the “traditional” wideband III. Proposed model CDMA systems. Therefore, it is straightforward to A. Receiver Structure apply this concept for channel estimation in IR-UWB. The receiver design should aim the recovery of data Basically, a RAKE receiver consists of multiple from a multipath environment. The most commonly correlators (also called RAKE fingers). Each finger adopted receiver architecture a multipath environment matches (correlates) the received pulse sequence is a rake receiver shown in Figure3. (spread by the multipath channel) with a delayed version of a template pulse g(t-τn).The correlator’s output is an estimate of the amplitude an of the corresponding channel tap (from eq.5). transmitted over a multipath channel then the received signal is, r(t) = ∈ ∞ 𝒔 𝒊 𝑵 𝒇 𝒄 𝒊 h(t-ItF) + n(t) 𝒊=𝟎 (6) Where n(t) is additive noise , h(t) is the composite channel response h(t)= hp(t)*g(t). Conventional RAKE Receiver ∞ h(t) = 𝒏=𝟎 𝒂 𝒏 g(t- 𝝉 𝒏 ) (7) A rake receiver has multiple fingers to resolve multipath component signals that have different path Matching the received signal with a template pulse, delays. A finger receives a signal containing all the which is a delayed copy of the transmitted pulse g(t), multiple paths then processes one of the multipath the correlator’s output for a RAKE finger component signals assigned to it. Each multipath has a corresponding to the multipath component at τn delay different distortion, diffraction, scattering, reflection etc in the i-th frame will be, that is mainly caused by the Rayleigh fading, AWGN, x i, n = 𝒓 𝒕 𝒈(𝒕 − 𝒊𝑻 𝒇− 𝝉 𝒏 ) 𝒅𝒕 (8) and the frequency offset between the source and the destination site. Therefore, the received signal of a finger should undergo phase alignment and frequency = ∈ 𝒔𝒊 𝑵𝒇 𝒄 𝒊 𝒉 𝒕 − 𝒊𝑻 𝒇 𝒈 𝒕 − 𝒊𝑻 𝒇 − 𝝉 𝒏 𝒅𝒕 + 𝒏,𝒊𝒏 offset alignment specific to the multipath as well as the (9) despreading process. A power channel estimator ∞ measures the signal power of the multipath to determine h(t) = 𝒏=𝟎 𝒂 𝒏 g(t- 𝝉 𝒏 ) (10) if it is strong enough to be considerable. The deskewer compensates individual multipath delays. After these processes the multipathpath signals are combined to = ∈ 𝒔𝒊 𝑵𝒇 𝒄 𝒊 𝒂, 𝒏 + 𝒏, (t) (11) recover the desired data .Let hp(t) be the (physical) multipath channel impulse response. Channel models The RAKE receiver is a matched filter (the received pulse is matched with a template that has the same proposed by IEEE 802.15.3a Task Group [28, 52] are waveform) and therefore (with known channel based on the famous multipath Saleh-Valenzuela coefficients) optimum with respect to the BER model [58], in which the multipath components arrive performance, and it also benefits from the fact that at the receiver in clusters, many results in existing literature on RAKE receivers for wireless communication systems e.g. WCDMA can still apply. However, there are some serious practical x i, n = 𝒓 𝒕 𝒈(𝒕 − 𝒊𝑻 𝒇− 𝝉 𝒏 ) 𝒅𝒕 (5) issues in this kind of receiver. 62 All Rights Reserved © 2012 IJARCET
  • 4. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 𝑴 B.Walsh-Hadmard sequence- x/= 𝒌=𝟏 𝜷𝒌 ∗ 𝒙𝒌 (13) Basically for spreading data we used different types of sequence so we have P-N sequence and Walsh – IV PERFOMANCE ANALYSIS Hadmard sequence but in this paper for spreading data The standard Gaussian approximation regarding fading is and also for better orthogonally we used Walsh- used with a signal to noise ratio analysis to derive the Bit Hadamard sequence so that sequence also called error ratio for QPSK modulation and we have specific orthogonal code. For improving better efficiency we weighted vector ω then the signal to noise ratio at the output used orthogonal function or Walsh-Hadmard Orthogonal sequence. For generating Walsh-Hadmard of the maximum ratio combiner can be easily shown a sequence we have NxN square matrix. To get the SNR = ωK ggk ω / ωK kω (14) desired length of Hadamard matrix can be generated by the following manner- Power spectral density of total noise after that Bit Error Ratio can be written as, 𝟏 𝟏 𝑯𝟏 = Pe(d) =½erfc(rootof(β SNR(C)) (15) 𝟏 −𝟏 𝑯𝑵 𝑯𝑵 𝑯 𝑯 𝟐 𝟐 𝑯𝑵 = 𝑯𝟏 = 𝑯 −𝑯 𝑯𝑵 −𝑯 𝑵 𝟐 𝟐 V. RESULT AND DISCUSSION Spreading sequence used for DS-CDMA system can be QPSK modulation is a technique that will modulate the represented by JxK matrices BJK. Where J is the transnitted signal and used for the simulations or spread number of sequence and K is sequence code length. with the spreading code sequence. Impulse response The code sequence is known as orthogonalSequence if, channel measurement is also utilized in which and only if matrix BJK is orthogonal – multipath components are generated through Rayleigh BJK BJKT = k IM (12) fading channel characteristics. Channel noise is generated and added to the multipath components. So Where k is the constant and BJKT is transposition of all the multipath components are added together for matrix BJK of order N and IN is the NxN unity matrix. In simulation at the receiver site. Integration process can the DS-CDMA system the number of chips per data take place after the multipath components is detected symbol is known as spreading factor (SF). after that Maximum ratio combining can be used for C Maximal Ratio Combining (Combining weight storing the integration results here combining result of coefficient and finger delay) multipath components to send for the decision bit device after all data is decoded and probability of error In the field of wireless communication we have much is computed and simulation have run with the Walsh- option to mitigate interference such as ISI, Equalizers Hadamard sequence. The purpose of this paper to and diversity. Diversity is techniques that will reduce design and implementation of CDMA RAKE Receiver amplitude fluctuation or fading mitigation. We have many type of diversity such as Antenna diversity, over the conventional CDMA Receiver in wireless feedback diversity, Scanning diversity, Maximum ratio communication and to achieve a better Bit Error Ratio combining, Equal gain combining, etc. MRC is the (BER). CDMA RAKE Receiver consists of many optimist form of diversity combining cause of correlators that correlate to spread signals. Multipath Maximum ratio combining all the integration result of fading is one of the major practical concerns in wireless code sequence by this we achieve better bit error ratio communications. (BER) and maximum signal to noise ratio (SNR). Finally, We will see that signal to noise ratio(SNR) and In Maximum ratio combining all integrated multipath bit error ratio (BER)graph comparison between CDMA components such as x1(t), x2(t), x3(t),………. xn(t) So receiver and CDMA RAKE receiver- whole of components are multiplied with complex conjugate weighted β1*(t),β2*(t), β3*(t)…… βn*(t) of channel characteristics. Then mathematical expression of the MRC can be written as- 63 All Rights Reserved © 2012 IJARCET
  • 5. ISSN: 2278 – 1323 International Journal of Advanced Research in Computer Engineering & Technology Volume 1, Issue 5, July 2012 VI. CONCLUSION Interference Mitigation by CDMA RAKE receiver with Walsh-Hadamard sequence as the spreading code has been introduced. We found that Conventional RAKE receiver gives the better performance in comparison with the conventional CDMA receiver in respect of system efficiency, SNR and BER preformance.In the proposed model each multipath component signal correlate with each other so that is big advantages cause of multiple code generators running continuously. So that proposed model with Walsh-Hadamard sequence gives an considerable result as compared to conventional CDMA receiver. CDMA Receiver (plot SNR b/w BER) VII. REFERRENCE [1] L. Harju et. al., “A Flexible RAKE Receiver Architecture for WCDMA Mobile Terminals,” for SPAWC ’01, Taoyuan, Taiwan, Mar. 2001, pp.9-12. [2] J.G. Proakis, Digital Communication", McGRAW-HILL. [3] T.S. Rappaport, Wireless Communications Principles and Practice", Prentice Hall [4] A.J. Viterbi, CDMA Principles of Spread Spectrum Communication",ADDISONWESLEYCOMPANY . [5] B. J. Wysocki and T. A. Wysocki, “Orthogonal Binary Sequences with Wide Range of Correlation Properties,” for ISCTA’01, . Ambleside, U.K., July 2001, pp. 483-485 [6] . Cheng and C. Beaulieu, “Accurate DS-CDMA Bit-Error Probability Calculation in Rayleigh Fading,” IEEE Trans. Wireless Commun., vol.1, no. 1, pp. 3-15, Jan. 2002. CDMA RAKE Receiver (plot SNR b/w BER) [7] M. F. Madkour, S. C. Gupta and E. Wang, “Successive interference cancellation Algorithms for Downlink W-CDMA Communications,” IEEE Trans. Wireless Commu., vol. 1, no. 1, January 2002 [8] S.Mudulodu, G. Leus, and A. Paul raj, “An interference suppressing RAKE receiver for the CDMA downlink," IEEE Sig.Proc. Lett., vol.11, pp. 521-524, May 2004 [9] M. Uzzafer, “Single Correlator Receiver for Wideband MultiPath Channel, “in Proc. IEEE 6th CAS Symp., Shanghai, vol. 2, June. 2004, pp.421-424 [10] F. Adachi et. al., “Broadband CDMA Techniques,” IEEE Wireless communications, vol. 12, no. 2, pp. 8-18, Apr. 2005 [11] M. Ali Akbar, Hamza Bin Tila, M. Zulkifl Khalid and Muhammad Asim Ajaz ―Bit Error Rate Improvement using ESPRIT based Beam forming and RAKE receiver‖, 978-14244- 4873-9/09/©2009 IEEE [12] R. Fantacci et. al., “Perspectives for Present and Future CDMA- based Communications,” IEEE commun. Magazine, vol. 43, no. 2, pp. 95-100,Feb. 2005. [13] R. Fantacci et. al., “Perspectives for Present and Future CDMAbased Communications,” IEEE commun. Magazine, vol. Comparison b/w different type of combining 43, no. 2, pp. 95-100,Feb. 2005. techniques (CDMA RAKE RECEIVER) 64 All Rights Reserved © 2012 IJARCET