SlideShare une entreprise Scribd logo
1  sur  10
Télécharger pour lire hors ligne
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

Multi-carrier Equalization by Restoration of
RedundancY (MERRY) for Adaptive Channel
Shortening in Multi-carrier Systems
Samir Abd Elghafar1,2, Salaheldin M. Diab1, Bassiouny M. Sallam1, Moawad I. Dessouky1,
El-Sayed M. El-Rabaie1, Fathi E. Abd El-Samie1
1Department of Electronics and Electrical Communications, Faculty of Electronic
Engineering, Menoufia University, Menouf, 32952, Egypt.
2Faculty of Engineering,
Department of Electrical Engineering,Jazan University,Jazan, Saudi Arabia

Abstract
This paper proposes a new blind adaptive channel shortening approach for multi-carrier systems. The
performance of the discrete Fourier transform-DMT (DFT-DMT) system is investigated with the proposed
DST-DMT system over the standard carrier serving area (CSA) loop1. Enhanced bit rates demonstrated
and less complexity also involved by the simulation of the DST-DMT system.

Keywords
DFT, DMT, DST.

1. INTRODUCTION
Multi carrier modulation, particularly Discrete Multi-tone (DMT) modulation, is one of the most
prominent modulation methods for high-speed digital communications. For the channel in the
DMT system separated into self- regulating sub-channels. The full amount of bits transmitted
over the channel would be the total amount of the bits transmitted in each sub-channel. The
binary input data are passed onto a set of parallel, independent sub-channels, each of which is
assigned a fixed number of bits during startup or system initialization. Given the measured SNR
of each sub-channel during startup, the number of bits for each sub-channel is then determined
[1]. Each sub-channel is encoded into a quadrature amplitude modulation (QAM) constellation of
the appropriate size. For example, if four bits are assigned to tone i, then tone i will use a 16QAM constellation for encoding. The modulation function, IFFT, converts the encoded binary
data in QAM constellation format from frequency domain to time domain for transmission .The
DMT demodulation regress the time domain signal back to frequency domain data.
A number of v samples is inserted as a guard period at the start of each DMT symbol of to
decrease inter-symbol interference (ISI) at v ≥ L-1, where L is the length of the channel. Intercarrier interference (ICI) can be reduced when the guard period is a cyclic prefix [2]. The guard
period reduces the channel throughput by a factor of N/ (N+ v), where N is both the symbol
length and FFT length. This factor decreases as v turns into large comparative to N, in order that
the presentation failure care for unreasonable. Hence, v is chosen to be relatively small compared
to N. In the field, however, ADSL and VDSL channel impulse responses can exceed N/16
samples [3].
DOI : 10.5121/ijnsa.2013.5606

65
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

Time-domain equalizer (TEQ) is used for shortening. Accordingly, the DMT equalizer
construction consists of a flow of a single TEQ to shorten the L, a fast Fourier transform (FFT) to
present multi carrier demodulation, and a single-tap frequency-domain equalizer (FEQ) per tone to
correct frequency distortion in the shortened channel. Different DMT TEQ design methods
optimize FIR coefficients based on training data under different criteria. The method of Minimum
Mean Squared Error (MMSE) design is one of the beneficial methods [4,5,6,7] to minimize the
mean square error among the output of the route consisting of the channel and TEQ filter and the
output of a controlled rout consisting of a transmission delay and a purpose filter. The method of
maximum shortening SNR (MSSNR) [3] deals with a challenge to reduce inter-symbol
interference (ISI) in the time domain. The MSSNR method aims at increasing the quotient of the
energy of the used channel impulse response within an object window of ν +1 samples to that
outer the object window. The Minimum-ISI (Min-ISI) method works by weighting the ISI in the
frequency domain [4], for example, to set the ISI in vacant and noisy sub-channels. The traditional
joint method of TEQ-FEQ structure equalizes all sub-channels that possibly bound bit rate
presentation. An alternate receiver architecture has been proposed in [8], in which to relocate the
TEQ procedures to the FEQ. The joint TEQ-FEQ would provide a multi-tap FEQ where each subchannel is discretely equalized. Another alternative structure has been proposed in [9], in which
the authors proposed the FEQ transfer to the TEQ to give up complex-valued time-domain
equalizer filter banks. Joint equalization methods give up higher data rates for the downstream
ADSL task [10].
Multi-carrier modulation (MCM) techniques including discrete multi-tone (DMT) and orthogonal
frequency division multiplexing (OFDM) have been used extensively in many wireless network
standards, such as IEEE 802.1 la, IEEE 802.16a, and wire-line digital communication systems,
such as (ADSL) [11,12,13]. MCMs based on discrete Fourier transform (DFT). They utilize the
complex exponential functions group such as orthogonal source. Particularly, in discrete multitone (DMT) systems, modulation by the IFFT and demodulation by the FFT create orthogonal
sub-channels [14]. But, the exponential functions are not the rare orthogonal source so as to
construct baseband multicarrier signals. A single trigonometric function can be used to perform as
an orthogonal source to apply to the MCM system, and this system can be synthesized using a
discrete sine transform (DST) [12].
TEQ design methods have more complications, and need a channel approximation. The proposed
algorithm in [15] which is a blind adaptive channel shortening algorithm solves the complexity
problem. This algorithm has low complexity and is globally convergent with only a small loss in
bit rate [15]. So in this paper, we can use the DST; along with its inverse as a replacement for the
inverse fast Fourier transform / fast Fourier transform (IFFT/FFT) stages in DMT systems in
order to enhance the performance of the algorithm in [15] and achieve a higher bit rate with low
complexity.

2. Scheme Design
The scheme design is shown in Figure 1. Every one of the N frequency bins is modulated by a
QAM signal, while frequently a number of bins are left as unacceptable carriers [4]. Modulation
is performed via an IFFT, and demodulation is accomplished via FFT. The TEQ is used to
decrease the channel length, and the follow-on reduced efficient channel is matched by a
frequency-domain equalizer (FEQ).

66
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

Figure 1 . DFT system model. IFFT: modulation, parallel to serial (P/S), add cyclic prefix (CP), eliminate
cyclic prefix (xCP) and FFT demodulation.

For the conventional DFT-DMT system, the channel input sequence [ x n , fft ] at the output of the
IFFT block can be presented as [16]

x n , fft =

1 N −1
⋅∑ Xb ⋅e
N b =0

j 2πbn
N

,

n = 0 , 1 , K , N −1

(1)

where X b is the encoded bit stream.
When adding the CP, the end v samples are identical to the first v samples in the symbol, i.e.

x( Mk + i ) = x( Mk + i + N ),

i ∈ { , L , v}
1

(2)

The symbol period is M = N + v and k is the symbol index. Figure 2 shows an example of this,
with N = 8, v= 2, and M = N + v = 10, and the symbol pictured is for k = 0. The received data r is
obtained from x by
Lh

r ( Mk + i ) = ∑ h(l ) ⋅ x( Mk + i − l ) + n( Mk + i )

(3)

l =0

67
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

Figure 2 . Demonstration of the change in the ISI at the end of the received symbol
and at the received CP .

and the equalized data y is obtained from r by
Lw

y ( Mk + i ) = ∑ w ( j ) ⋅ r ( Mk + i − j )

(4)

j =0

The channel has Lh + 1 taps, the TEQ has Lw + 1 taps and the effective channel c = h ∗ w has

Lc + 1 taps, where Lc = Lh + Lw .

3. Description algorithm of MERRY
Consider the example in Figure 2. The broadcasted samples 2 and 10 are the same. But, at the
receiver, the interfering samples earlier than sample 2 are not the whole identical to their
correspondences before sample 10. If h(2 ), h(3) and h(4 ) were zero, then r (2 ) = r (10) . If we
try to force r (2 ) = r (10 ) , we may force h(2 ) = h(3) = h(4 ) = 0, forcing the channel selected the
same like the CP. The location of the window of v non-zero taps can be varied by comparing
r (3) to r (11) , or r (4 ) to r (12 ) , etc. In general, if the channel length Lh + 1 ≤ v , in that case the
previous sample inside the CP must look like the previous sample inside the symbol. Unit cost
function that reproduce:

[

2

]

J ∆ = E y (Mk + v + ∆ ) − y (Mk + v + N + ∆ ) ,

∆ ∈ {0,L , M − 1}

(5)

where ∆ is the sign synchronization parameter, which correspond to the preferred delay of the
channel-TEQ collection. The choice of ∆ affects the cost function.
A randomization gradient descent of Eq.(5) guides to a sightless, adaptive TEQ, because the
broadcasted data not require be identified. The proposed MERRY algorithm performs a
randomization gradient descent of Eq.(5), with a limitation to keep away from the slight solution
w = 0. The MERRY algorithm is summarized as follows:

For symbol k = 0,1,2,L ,
68
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

~ (k ) = r (Mk + v + ∆ ) − r (Mk + v + N + ∆ )
r
e (k

)=

w

T

(6)

(k )~ (k )
r

(7)

~
w(k + 1) = w(k ) − µe(k )~ ∗ (k )
r

(8)

~
w(k + 1)
w(k + 1) = ~
w(k + 1)

(9)

where r (i ) = [r (i ), r (i − 1),L , r (i − Lw )] , and ∗ denotes complex conjugation.
T

Due to the fact that MERRY compares with CP at the last part of the symbol, one update is
achievable for each symbol. Interchanging applications of the limitation have set up one tap to
unity, retaining a channel approximation and renormalizing to enforce c = 1 instead of w = 1 ,
or with a retribution term in the cost function to put into effect the norm limitation.

4. DST Implementation
Applying the above algorithm to the DST approach solves the complexity problem and achieves
higher bit rates than the DFT system.
For the proposed DST-DMT system, the channel input sequence { x n , DST } at the output of the
IDST block can be presented as [17]
1

x n , DST

 2  2 N −1
 πb
=   ⋅ ∑ Ab ⋅ X b ⋅ sin 
(2n + 1)

 N  b =0
 2N


where
 1

Ab =  2
1


,

for b = 0

n = 0, 1, L , N − 1

(10)

(11)

otherwise

, and X b is the encoded bit stream.
Lh

rDST ( Mk + i ) = ∑ h(l ) ⋅ x DST ( Mk + i − l ) + n( Mk + i )
l =0
Lw

y DST ( Mk + i ) = ∑ w ( j ) ⋅ rDST ( Mk + i − j )
j =0

69
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

IDST
DST

DST

DST

Figure 3 DST system model.

It is known that the DST has excellent spectral compaction and energy concentration properties
(See Fig.(3)). It uses only real arithmetics as opposed to the complex-valued DFT. This reduces
the signal processing complexity especially for real pulse-amplitude modulation signaling, where
DFT-based processing still uses complex arithmetics and suffers from in-phase/quadrature
imbalance problems which can cause appreciable performance degradation [11-18].
The cost function in Eq. (5) can be rewritten as:

[

2

]

J ∆ , DST = E y DST (Mk + v + ∆ ) − y DST (Mk + v + N + ∆ ) ,

∆ ∈ {0, L , M − 1}

(12)

The MERRY algorithm can be rewritten as:
For symbol k = 0,1,2, L,

~ (k ) = r (Mk + v + ∆ ) − r (Mk + v + N + ∆ )
rDST
DST
DST

(13)

~
e DST (k ) = wT (k )rDST (k )
DST

(14)

~
wDST (k + 1) = wDST (k ) − µe DST (k )~DST (k )
r∗

(15)

~
w (k + 1)
wDST (k + 1) = ~ DST
wDST (k + 1)

(16)

where rDST (i ) = [rDST (i ), rDST (i − 1),L , rDST (i − Lw )] , and ∗ denotes complex conjugation.
T

5. Simulation parameters
We use the standard carrier-serving-area (CSA) loop1 [15] as our test channel. The channel
impulse response consists of 512 samples sampled at a rate of 2.208 MHz. Also employ high pass
filter at cutoff frequency of 5.4 kHz and pass band ripple of 0.5 dB to the standard loop1 to add
the outcome of the splitter by the side of the transmitter. The DC channel (channel 0), channels 15, and the Nyquist channel are not used. The DSL presentation metric is the possible bit rate for a
fixed probability of error,
70
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

 SNRi 
B = ∑ ln1 +

Γ 

i

(17)

When SNRi = 40 dB in frequency bin i , and Γ is the SNR gap ( Γ =9.8 + 6 - 4.2 = 11.6 dB).
This corresponds to a system margin of 6 dB and a coding gain of 4.2 dB. Both the FFT size and
the DST size are set to N = 512 . We assume that the power allocation is constant over all used
sub-channels and that it is not changed after the TEQ is placed into the system.

6. Simulation Results
A- for DFT Approach
Figure 4 shows simulation results using CSA loop1. The CP size is 32. The FFT length is 512.
We have 16 taps for the TEQ. Figure 5 demonstrates a plan for bit rate opposed versus SNR. The
Bit rate for this plot was computed by running for 5000 symbols and gradually decreasing the step
size over time. For all these SNR values, MERRY approaches the max SSNR solution.

Figure 4. Achievable bit rate vs. time for the DFT system.

71
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

Figure 5 Achievable bit rate vs. SNR for the DFT system.

B- DST System Results
As compared to figure 4 for the DFT approach, figure 6 shows the achievable bit rate vs.
time for the DST approach at the same simulation parameters. As we can see in the case
of DST approach, the performance is better (high bit rate and low complexity) than that
of the DFT approach.
Also, when comparing figure 5 for the DFT approach with figure 7 for the DST approach,
we can see that the DST approach provides a higher bit rate than the DFT approach at the
same SNR values.

72
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

Figure 6 Achievable bit rate vs. time for the DST system.

Figure 7 Achievable bit rate vs. SNR for the DST system.

73
International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013

8. Conclusions
The proposed IDST/DST has been used for modulation /demodulation stages in DMT systems.
Our simulation results show that the DST-DMT system provides a better performance than the
DFT-DMT system because of the excellent spectral compaction and energy concentration
properties of the DST compared to the DFT. It was concluded that the proposed DST-DMT
system achieves higher bit rates as compared with the conventional DFT-DMT system.

References
[1]

[2]

[3]
[4]
[5]
[6]

[7]

[8]
[9]

[10]

[12]

[13]

[14]
[15]
[16]
[17]
[18]

I. Lee, J. S. Chow, and J. M. Cioffi, "Performance evaluation of a fast computation algorithm for the
DMT in high-speed subscriber loop," IEEE J. on Selected Areas in Comm., vol. 13, pp. 1564-1570,
Dec. 1995.
K. Vanble, M. Moonen, and G. Leus, “Linear and Decision-Feedback Per Tone Equalization for
DMT-Based Transmission Over IIR Channels,” I IEEE Transactions Signal Processing, vol. 54, no. 1,
Jan. 2006.
G. Arslan, B. Lu, L. D. Clark, and B. L. Evans, "Iterative Refinement Methods for Time-Domain
Equalizer Design," EURASIP Journal on Applied Signal Processing vol. 2006, pp.1–12, Aug. 2005.
G. Arslan, B. L. Evans, and S. Kiaei, “Equalization for Discrete Multitone Transceivers to Maximize
Bit Rate,” IEEE Transactions Signal Processing, vol. 49, no. 12, pp. 3123–3135, 2001.
J. S. Chow and J. M. Cioffi, "A cost-effective maximum likelihood receiver for June multicarrier
systems," in Proc. IEEE Int. Conf. Comm., vol. 2, (Chicago, IL), pp. 948- 952,1992.
J. S. Chow, J. M. Cioffi, and J. A. Bingham, "Equalizer training algorithms for multicarrier
modulation systems," in Proc. IEEE Int. Conf. Comm., vol. 2, (Geneva, Switzerland), pp. 761-765,
May 1993.
N. Al-Dhahir and J. M. Cioffi, "Efficiently computed reduced-parameter input-aided MMSE
equalizers for ML detection: A unified approach," IEEE Trans. on Info. Theory,vol. 42, pp. 903-915,
May 1996
K. Van Acker, G. Leus, M. Moonen, O. van de Wiel, and T. Pollet, “Per Tone no.1, pp. Equalization
for DMT-based Systems,” IEEE Transactions on Communications, vol. 49,109–119, 2001.
M. Ding, Z. Shen, and B. L. Evans, “An Achievable Performance Upper Bound for Discrete Multi
Tone Equalization,” in Proceedings of IEEE Global Telecommunications Conference (GLOBECOM
’04), vol. 4, pp. 2297–2301, Dallas, Tex, USA, November–December 2004.
R. K. Martin, K. Vanbleu, M. Ding, et al., “Unification and Evaluation of Equalization Structures and
Design Algorithms for Discrete Multi-tone Modulation Systems,” IEEE Transactions Signal
Processing, vol. 53, no. 10, part 1, pp. 3880–3894, 2005. [11]
A. Rushdi and J. Tuqan, "PAPR
Reduction in Trigonometric-Based OFDM Systems," IEEE Signals, Systems and Computers,
Conference Record of the Forty-First Asiloma Conference pp.1747–1751, Nov. 2007.
P. Tan, and N. C. Beaulieu, "A Comparison of DCT-Based OFDM and DFT-Based OFDM in
Frequency Offset and Fading Channels," IEEE Transactions on Communications, vol. 54, no. 11, pp.
2113–2125, Nov. 2006.
P. Tan, and N. C. Beaulieu, "An Improved DCT-Based OFDM Data Transmission Scheme," Personal,
Indoor and Mobile Radio Communications, IEEE 16th International Symposium, pp.745–749, Sept.
2005.
E. Khan, and C. Heneghan, "Iterative Refinement Methods for Time-Domain Equalizer Design,"
International Journal of Signal Processing, pp.126–130, 2006.
R. K. Martin, J. Balakrishnan, W. A. Sethares, and C. R. Johnson, Jr., “A Blind, Adaptive TEQ for
Multicarrier Systems," IEEE Signal Processing Letters, vol. 9, no. 11, pp. 341{343, Nov. 2002.
A.-Y. Wu T.-S. Chan, "Cost-efficient Parallel Lattice VLSI Architecture for the IFFT/FFT in DMT
Transceiver Technology," IEEE, pp. 3517-3520, 1998.
A. B. Watson, "Image Compression Using the Discrete Cosine Transform," Mathematica Journal,
4(1), 1994, p. 81-88.
P. Tan, N. C. Beaulieu, “A Comparison of DCT-Based OFDM and DFT-Based OFDM in frequency
offset and fading channels,” IEEE Trans. On Commun., vol. 54, no. 11, Nov.2006.

74

Contenu connexe

Tendances

Performance evaluation on the basis of bit error rate for different order of ...
Performance evaluation on the basis of bit error rate for different order of ...Performance evaluation on the basis of bit error rate for different order of ...
Performance evaluation on the basis of bit error rate for different order of ...ijmnct
 
Simulation of ofdm modulation adapted to the transmission of a fixed image
Simulation of ofdm modulation adapted to the transmission of a fixed imageSimulation of ofdm modulation adapted to the transmission of a fixed image
Simulation of ofdm modulation adapted to the transmission of a fixed imageIAEME Publication
 
1_VTC_Qian
1_VTC_Qian1_VTC_Qian
1_VTC_QianQian Han
 
Capsulization of Existing Space Time Techniques
Capsulization of Existing Space Time TechniquesCapsulization of Existing Space Time Techniques
Capsulization of Existing Space Time TechniquesIJEEE
 
Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...
Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...
Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...IOSR Journals
 
Simultaneous_VTC_Qian
Simultaneous_VTC_QianSimultaneous_VTC_Qian
Simultaneous_VTC_QianQian Han
 
MMSE and ZF Analysis of Macrodiversity MIMO Systems and Wimax Networks over F...
MMSE and ZF Analysis of Macrodiversity MIMO Systems and Wimax Networks over F...MMSE and ZF Analysis of Macrodiversity MIMO Systems and Wimax Networks over F...
MMSE and ZF Analysis of Macrodiversity MIMO Systems and Wimax Networks over F...IJERA Editor
 
Performance Analysis of MIMO-OFDM System Using QOSTBC Code Structure for M-PSK
Performance Analysis of MIMO-OFDM System Using QOSTBC Code Structure for M-PSKPerformance Analysis of MIMO-OFDM System Using QOSTBC Code Structure for M-PSK
Performance Analysis of MIMO-OFDM System Using QOSTBC Code Structure for M-PSKCSCJournals
 
Lte ausarbeitung zarei
Lte ausarbeitung zareiLte ausarbeitung zarei
Lte ausarbeitung zareimehemed sifaw
 
Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...
Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...
Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...IJERA Editor
 
Classical Discrete-Time Fourier TransformBased Channel Estimation for MIMO-OF...
Classical Discrete-Time Fourier TransformBased Channel Estimation for MIMO-OF...Classical Discrete-Time Fourier TransformBased Channel Estimation for MIMO-OF...
Classical Discrete-Time Fourier TransformBased Channel Estimation for MIMO-OF...IJCSEA Journal
 
06 Bandwidth Utilization_Multiplexing_and_Spreading
06 Bandwidth Utilization_Multiplexing_and_Spreading06 Bandwidth Utilization_Multiplexing_and_Spreading
06 Bandwidth Utilization_Multiplexing_and_SpreadingAhmar Hashmi
 
Analyses and performance of techniques papr reduction for stbc mimo ofdm syst...
Analyses and performance of techniques papr reduction for stbc mimo ofdm syst...Analyses and performance of techniques papr reduction for stbc mimo ofdm syst...
Analyses and performance of techniques papr reduction for stbc mimo ofdm syst...ijwmn
 
09 23sept 8434 10235-1-ed performance (edit ari)update 17jan18tyas
09 23sept 8434 10235-1-ed performance (edit ari)update 17jan18tyas09 23sept 8434 10235-1-ed performance (edit ari)update 17jan18tyas
09 23sept 8434 10235-1-ed performance (edit ari)update 17jan18tyasIAESIJEECS
 

Tendances (16)

fading-conf
fading-conffading-conf
fading-conf
 
B0510916
B0510916B0510916
B0510916
 
Performance evaluation on the basis of bit error rate for different order of ...
Performance evaluation on the basis of bit error rate for different order of ...Performance evaluation on the basis of bit error rate for different order of ...
Performance evaluation on the basis of bit error rate for different order of ...
 
Simulation of ofdm modulation adapted to the transmission of a fixed image
Simulation of ofdm modulation adapted to the transmission of a fixed imageSimulation of ofdm modulation adapted to the transmission of a fixed image
Simulation of ofdm modulation adapted to the transmission of a fixed image
 
1_VTC_Qian
1_VTC_Qian1_VTC_Qian
1_VTC_Qian
 
Capsulization of Existing Space Time Techniques
Capsulization of Existing Space Time TechniquesCapsulization of Existing Space Time Techniques
Capsulization of Existing Space Time Techniques
 
Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...
Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...
Performance Analysis of Various Symbol Detection Techniques in Wireless MIMO ...
 
Simultaneous_VTC_Qian
Simultaneous_VTC_QianSimultaneous_VTC_Qian
Simultaneous_VTC_Qian
 
MMSE and ZF Analysis of Macrodiversity MIMO Systems and Wimax Networks over F...
MMSE and ZF Analysis of Macrodiversity MIMO Systems and Wimax Networks over F...MMSE and ZF Analysis of Macrodiversity MIMO Systems and Wimax Networks over F...
MMSE and ZF Analysis of Macrodiversity MIMO Systems and Wimax Networks over F...
 
Performance Analysis of MIMO-OFDM System Using QOSTBC Code Structure for M-PSK
Performance Analysis of MIMO-OFDM System Using QOSTBC Code Structure for M-PSKPerformance Analysis of MIMO-OFDM System Using QOSTBC Code Structure for M-PSK
Performance Analysis of MIMO-OFDM System Using QOSTBC Code Structure for M-PSK
 
Lte ausarbeitung zarei
Lte ausarbeitung zareiLte ausarbeitung zarei
Lte ausarbeitung zarei
 
Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...
Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...
Reduction of PAPR and Efficient detection ordering scheme for MIMO Transmissi...
 
Classical Discrete-Time Fourier TransformBased Channel Estimation for MIMO-OF...
Classical Discrete-Time Fourier TransformBased Channel Estimation for MIMO-OF...Classical Discrete-Time Fourier TransformBased Channel Estimation for MIMO-OF...
Classical Discrete-Time Fourier TransformBased Channel Estimation for MIMO-OF...
 
06 Bandwidth Utilization_Multiplexing_and_Spreading
06 Bandwidth Utilization_Multiplexing_and_Spreading06 Bandwidth Utilization_Multiplexing_and_Spreading
06 Bandwidth Utilization_Multiplexing_and_Spreading
 
Analyses and performance of techniques papr reduction for stbc mimo ofdm syst...
Analyses and performance of techniques papr reduction for stbc mimo ofdm syst...Analyses and performance of techniques papr reduction for stbc mimo ofdm syst...
Analyses and performance of techniques papr reduction for stbc mimo ofdm syst...
 
09 23sept 8434 10235-1-ed performance (edit ari)update 17jan18tyas
09 23sept 8434 10235-1-ed performance (edit ari)update 17jan18tyas09 23sept 8434 10235-1-ed performance (edit ari)update 17jan18tyas
09 23sept 8434 10235-1-ed performance (edit ari)update 17jan18tyas
 

En vedette

Performance Comparison of Multi-Carrier CDMA Using QPSK and BPSK Modulation
Performance Comparison of Multi-Carrier CDMA Using QPSK and BPSK ModulationPerformance Comparison of Multi-Carrier CDMA Using QPSK and BPSK Modulation
Performance Comparison of Multi-Carrier CDMA Using QPSK and BPSK ModulationIOSR Journals
 
Pll carrier synch f-ling_v1.2
Pll carrier synch f-ling_v1.2Pll carrier synch f-ling_v1.2
Pll carrier synch f-ling_v1.2Fuyun Ling
 
Hr africa shane hodgson v0.3
Hr africa shane hodgson v0.3Hr africa shane hodgson v0.3
Hr africa shane hodgson v0.3Shane Hodgson
 
Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationSecuring mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationIJNSA Journal
 
Mto summit hodgson presentation
Mto summit   hodgson presentationMto summit   hodgson presentation
Mto summit hodgson presentationShane Hodgson
 
My three favorite subjects
My three favorite subjectsMy three favorite subjects
My three favorite subjectsatiero81
 
Performance analysis of transport layer basedhybrid covert channel detection ...
Performance analysis of transport layer basedhybrid covert channel detection ...Performance analysis of transport layer basedhybrid covert channel detection ...
Performance analysis of transport layer basedhybrid covert channel detection ...IJNSA Journal
 
Investigating the effects of the common control channel challenge in multicha...
Investigating the effects of the common control channel challenge in multicha...Investigating the effects of the common control channel challenge in multicha...
Investigating the effects of the common control channel challenge in multicha...IJNSA Journal
 
Menulis Review Film
Menulis Review FilmMenulis Review Film
Menulis Review FilmYulef Dian
 
Introduction to pll
Introduction to pllIntroduction to pll
Introduction to pllsartaj ahmed
 
Administració i gestió d'organitzacions - Pac3 - Solució - Lídia Bria
Administració i gestió d'organitzacions - Pac3 - Solució - Lídia BriaAdministració i gestió d'organitzacions - Pac3 - Solució - Lídia Bria
Administració i gestió d'organitzacions - Pac3 - Solució - Lídia BriaLidia Bria
 
Administració i gestió d'organitzacions - Pac4 - Lidia Bria
Administració i gestió d'organitzacions - Pac4 - Lidia BriaAdministració i gestió d'organitzacions - Pac4 - Lidia Bria
Administració i gestió d'organitzacions - Pac4 - Lidia BriaLidia Bria
 
Administració i gestió d'organitzacions - Pac2 - Lidia Bria
Administració i gestió d'organitzacions - Pac2 - Lidia BriaAdministració i gestió d'organitzacions - Pac2 - Lidia Bria
Administració i gestió d'organitzacions - Pac2 - Lidia BriaLidia Bria
 
Administració i gestió d'organitzacions - Pac1 - Solució - Lidia Bria
Administració i gestió d'organitzacions - Pac1 - Solució - Lidia BriaAdministració i gestió d'organitzacions - Pac1 - Solució - Lidia Bria
Administració i gestió d'organitzacions - Pac1 - Solució - Lidia BriaLidia Bria
 

En vedette (19)

Phase shift
Phase shiftPhase shift
Phase shift
 
Performance Comparison of Multi-Carrier CDMA Using QPSK and BPSK Modulation
Performance Comparison of Multi-Carrier CDMA Using QPSK and BPSK ModulationPerformance Comparison of Multi-Carrier CDMA Using QPSK and BPSK Modulation
Performance Comparison of Multi-Carrier CDMA Using QPSK and BPSK Modulation
 
Pll carrier synch f-ling_v1.2
Pll carrier synch f-ling_v1.2Pll carrier synch f-ling_v1.2
Pll carrier synch f-ling_v1.2
 
Hr africa shane hodgson v0.3
Hr africa shane hodgson v0.3Hr africa shane hodgson v0.3
Hr africa shane hodgson v0.3
 
Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authenticationSecuring mobile cloud using finger print authentication
Securing mobile cloud using finger print authentication
 
Mto summit hodgson presentation
Mto summit   hodgson presentationMto summit   hodgson presentation
Mto summit hodgson presentation
 
Mileniumi (1)
Mileniumi (1)Mileniumi (1)
Mileniumi (1)
 
Group project 2
Group project 2Group project 2
Group project 2
 
My three favorite subjects
My three favorite subjectsMy three favorite subjects
My three favorite subjects
 
Performance analysis of transport layer basedhybrid covert channel detection ...
Performance analysis of transport layer basedhybrid covert channel detection ...Performance analysis of transport layer basedhybrid covert channel detection ...
Performance analysis of transport layer basedhybrid covert channel detection ...
 
Investigating the effects of the common control channel challenge in multicha...
Investigating the effects of the common control channel challenge in multicha...Investigating the effects of the common control channel challenge in multicha...
Investigating the effects of the common control channel challenge in multicha...
 
Instagram tutorial
Instagram tutorialInstagram tutorial
Instagram tutorial
 
Menulis Review Film
Menulis Review FilmMenulis Review Film
Menulis Review Film
 
Introduction to pll
Introduction to pllIntroduction to pll
Introduction to pll
 
Administració i gestió d'organitzacions - Pac3 - Solució - Lídia Bria
Administració i gestió d'organitzacions - Pac3 - Solució - Lídia BriaAdministració i gestió d'organitzacions - Pac3 - Solució - Lídia Bria
Administració i gestió d'organitzacions - Pac3 - Solució - Lídia Bria
 
Administració i gestió d'organitzacions - Pac4 - Lidia Bria
Administració i gestió d'organitzacions - Pac4 - Lidia BriaAdministració i gestió d'organitzacions - Pac4 - Lidia Bria
Administració i gestió d'organitzacions - Pac4 - Lidia Bria
 
Administració i gestió d'organitzacions - Pac2 - Lidia Bria
Administració i gestió d'organitzacions - Pac2 - Lidia BriaAdministració i gestió d'organitzacions - Pac2 - Lidia Bria
Administració i gestió d'organitzacions - Pac2 - Lidia Bria
 
Administració i gestió d'organitzacions - Pac1 - Solució - Lidia Bria
Administració i gestió d'organitzacions - Pac1 - Solució - Lidia BriaAdministració i gestió d'organitzacions - Pac1 - Solució - Lidia Bria
Administració i gestió d'organitzacions - Pac1 - Solució - Lidia Bria
 
English IMRD
English IMRDEnglish IMRD
English IMRD
 

Similaire à Multi carrier equalization by restoration of redundanc y (merry) for adaptive channel shortening in multi-carrier systems

Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...IJNSA Journal
 
Analysis of Peak to Average Power Ratio Reduction Techniques in Sfbc Ofdm System
Analysis of Peak to Average Power Ratio Reduction Techniques in Sfbc Ofdm SystemAnalysis of Peak to Average Power Ratio Reduction Techniques in Sfbc Ofdm System
Analysis of Peak to Average Power Ratio Reduction Techniques in Sfbc Ofdm SystemIOSR Journals
 
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...ijcnac
 
A blind channel shortening for multiuser, multicarrier CDMA system over multi...
A blind channel shortening for multiuser, multicarrier CDMA system over multi...A blind channel shortening for multiuser, multicarrier CDMA system over multi...
A blind channel shortening for multiuser, multicarrier CDMA system over multi...TELKOMNIKA JOURNAL
 
Pilot based channel estimation improvement in orthogonal frequency-division m...
Pilot based channel estimation improvement in orthogonal frequency-division m...Pilot based channel estimation improvement in orthogonal frequency-division m...
Pilot based channel estimation improvement in orthogonal frequency-division m...IJECEIAES
 
Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...
Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...
Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...IOSRJVSP
 
Simulation of OFDM modulation
Simulation of OFDM modulationSimulation of OFDM modulation
Simulation of OFDM modulationDawood Aqlan
 
An identification of the tolerable time-interleaved analog-todigital convert...
An identification of the tolerable time-interleaved analog-todigital convert...An identification of the tolerable time-interleaved analog-todigital convert...
An identification of the tolerable time-interleaved analog-todigital convert...IJECEIAES
 
An improved dft based channel estimation
An improved dft based channel estimationAn improved dft based channel estimation
An improved dft based channel estimationsakru naik
 
Improved Timing Estimation Using Iterative Normalization Technique for OFDM S...
Improved Timing Estimation Using Iterative Normalization Technique for OFDM S...Improved Timing Estimation Using Iterative Normalization Technique for OFDM S...
Improved Timing Estimation Using Iterative Normalization Technique for OFDM S...IJECEIAES
 
Blind Estimation of Carrier Frequency Offset in Multicarrier Communication Sy...
Blind Estimation of Carrier Frequency Offset in Multicarrier Communication Sy...Blind Estimation of Carrier Frequency Offset in Multicarrier Communication Sy...
Blind Estimation of Carrier Frequency Offset in Multicarrier Communication Sy...IDES Editor
 
Channel Equalization of WCDMA Downlink System Using Finite Length MMSE-DFE
Channel Equalization of WCDMA Downlink System Using Finite Length MMSE-DFEChannel Equalization of WCDMA Downlink System Using Finite Length MMSE-DFE
Channel Equalization of WCDMA Downlink System Using Finite Length MMSE-DFEIOSR Journals
 
Channel Equalization of WCDMA Downlink System Using Finite Length MMSE-DFE
Channel Equalization of WCDMA Downlink System Using Finite Length MMSE-DFEChannel Equalization of WCDMA Downlink System Using Finite Length MMSE-DFE
Channel Equalization of WCDMA Downlink System Using Finite Length MMSE-DFEIOSR Journals
 
Design Ofdm System And Remove Nonlinear Distortion In OFDM Signal At Transmit...
Design Ofdm System And Remove Nonlinear Distortion In OFDM Signal At Transmit...Design Ofdm System And Remove Nonlinear Distortion In OFDM Signal At Transmit...
Design Ofdm System And Remove Nonlinear Distortion In OFDM Signal At Transmit...Rupesh Sharma
 
Turbo Detection in Rayleigh flat fading channel with unknown statistics
Turbo Detection in Rayleigh flat fading channel with unknown statisticsTurbo Detection in Rayleigh flat fading channel with unknown statistics
Turbo Detection in Rayleigh flat fading channel with unknown statisticsijwmn
 
Spectrum-efficiency parametric channel estimation scheme for massive MIMO sys...
Spectrum-efficiency parametric channel estimation scheme for massive MIMO sys...Spectrum-efficiency parametric channel estimation scheme for massive MIMO sys...
Spectrum-efficiency parametric channel estimation scheme for massive MIMO sys...Qian Han
 
Review on Doubling the Rate of SEFDM Systems using Hilbert Pairs
Review on Doubling the Rate of SEFDM Systems using Hilbert PairsReview on Doubling the Rate of SEFDM Systems using Hilbert Pairs
Review on Doubling the Rate of SEFDM Systems using Hilbert Pairsijtsrd
 
V.KARTHIKEYAN PUBLISHED ARTICLE AAA
V.KARTHIKEYAN PUBLISHED ARTICLE AAAV.KARTHIKEYAN PUBLISHED ARTICLE AAA
V.KARTHIKEYAN PUBLISHED ARTICLE AAAKARTHIKEYAN V
 
V.karthikeyan published article1
V.karthikeyan published article1V.karthikeyan published article1
V.karthikeyan published article1KARTHIKEYAN V
 

Similaire à Multi carrier equalization by restoration of redundanc y (merry) for adaptive channel shortening in multi-carrier systems (20)

Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...
Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive ...
 
Analysis of Peak to Average Power Ratio Reduction Techniques in Sfbc Ofdm System
Analysis of Peak to Average Power Ratio Reduction Techniques in Sfbc Ofdm SystemAnalysis of Peak to Average Power Ratio Reduction Techniques in Sfbc Ofdm System
Analysis of Peak to Average Power Ratio Reduction Techniques in Sfbc Ofdm System
 
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...
Performance Comparison of Modified Variable Step Size Leaky LMS Algorithm for...
 
A blind channel shortening for multiuser, multicarrier CDMA system over multi...
A blind channel shortening for multiuser, multicarrier CDMA system over multi...A blind channel shortening for multiuser, multicarrier CDMA system over multi...
A blind channel shortening for multiuser, multicarrier CDMA system over multi...
 
Pilot based channel estimation improvement in orthogonal frequency-division m...
Pilot based channel estimation improvement in orthogonal frequency-division m...Pilot based channel estimation improvement in orthogonal frequency-division m...
Pilot based channel estimation improvement in orthogonal frequency-division m...
 
Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...
Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...
Adaptive Channel Equalization using Multilayer Perceptron Neural Networks wit...
 
Simulation of OFDM modulation
Simulation of OFDM modulationSimulation of OFDM modulation
Simulation of OFDM modulation
 
An identification of the tolerable time-interleaved analog-todigital convert...
An identification of the tolerable time-interleaved analog-todigital convert...An identification of the tolerable time-interleaved analog-todigital convert...
An identification of the tolerable time-interleaved analog-todigital convert...
 
An improved dft based channel estimation
An improved dft based channel estimationAn improved dft based channel estimation
An improved dft based channel estimation
 
International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)International Journal of Engineering Inventions (IJEI)
International Journal of Engineering Inventions (IJEI)
 
Improved Timing Estimation Using Iterative Normalization Technique for OFDM S...
Improved Timing Estimation Using Iterative Normalization Technique for OFDM S...Improved Timing Estimation Using Iterative Normalization Technique for OFDM S...
Improved Timing Estimation Using Iterative Normalization Technique for OFDM S...
 
Blind Estimation of Carrier Frequency Offset in Multicarrier Communication Sy...
Blind Estimation of Carrier Frequency Offset in Multicarrier Communication Sy...Blind Estimation of Carrier Frequency Offset in Multicarrier Communication Sy...
Blind Estimation of Carrier Frequency Offset in Multicarrier Communication Sy...
 
Channel Equalization of WCDMA Downlink System Using Finite Length MMSE-DFE
Channel Equalization of WCDMA Downlink System Using Finite Length MMSE-DFEChannel Equalization of WCDMA Downlink System Using Finite Length MMSE-DFE
Channel Equalization of WCDMA Downlink System Using Finite Length MMSE-DFE
 
Channel Equalization of WCDMA Downlink System Using Finite Length MMSE-DFE
Channel Equalization of WCDMA Downlink System Using Finite Length MMSE-DFEChannel Equalization of WCDMA Downlink System Using Finite Length MMSE-DFE
Channel Equalization of WCDMA Downlink System Using Finite Length MMSE-DFE
 
Design Ofdm System And Remove Nonlinear Distortion In OFDM Signal At Transmit...
Design Ofdm System And Remove Nonlinear Distortion In OFDM Signal At Transmit...Design Ofdm System And Remove Nonlinear Distortion In OFDM Signal At Transmit...
Design Ofdm System And Remove Nonlinear Distortion In OFDM Signal At Transmit...
 
Turbo Detection in Rayleigh flat fading channel with unknown statistics
Turbo Detection in Rayleigh flat fading channel with unknown statisticsTurbo Detection in Rayleigh flat fading channel with unknown statistics
Turbo Detection in Rayleigh flat fading channel with unknown statistics
 
Spectrum-efficiency parametric channel estimation scheme for massive MIMO sys...
Spectrum-efficiency parametric channel estimation scheme for massive MIMO sys...Spectrum-efficiency parametric channel estimation scheme for massive MIMO sys...
Spectrum-efficiency parametric channel estimation scheme for massive MIMO sys...
 
Review on Doubling the Rate of SEFDM Systems using Hilbert Pairs
Review on Doubling the Rate of SEFDM Systems using Hilbert PairsReview on Doubling the Rate of SEFDM Systems using Hilbert Pairs
Review on Doubling the Rate of SEFDM Systems using Hilbert Pairs
 
V.KARTHIKEYAN PUBLISHED ARTICLE AAA
V.KARTHIKEYAN PUBLISHED ARTICLE AAAV.KARTHIKEYAN PUBLISHED ARTICLE AAA
V.KARTHIKEYAN PUBLISHED ARTICLE AAA
 
V.karthikeyan published article1
V.karthikeyan published article1V.karthikeyan published article1
V.karthikeyan published article1
 

Dernier

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Dernier (20)

Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

Multi carrier equalization by restoration of redundanc y (merry) for adaptive channel shortening in multi-carrier systems

  • 1. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 Multi-carrier Equalization by Restoration of RedundancY (MERRY) for Adaptive Channel Shortening in Multi-carrier Systems Samir Abd Elghafar1,2, Salaheldin M. Diab1, Bassiouny M. Sallam1, Moawad I. Dessouky1, El-Sayed M. El-Rabaie1, Fathi E. Abd El-Samie1 1Department of Electronics and Electrical Communications, Faculty of Electronic Engineering, Menoufia University, Menouf, 32952, Egypt. 2Faculty of Engineering, Department of Electrical Engineering,Jazan University,Jazan, Saudi Arabia Abstract This paper proposes a new blind adaptive channel shortening approach for multi-carrier systems. The performance of the discrete Fourier transform-DMT (DFT-DMT) system is investigated with the proposed DST-DMT system over the standard carrier serving area (CSA) loop1. Enhanced bit rates demonstrated and less complexity also involved by the simulation of the DST-DMT system. Keywords DFT, DMT, DST. 1. INTRODUCTION Multi carrier modulation, particularly Discrete Multi-tone (DMT) modulation, is one of the most prominent modulation methods for high-speed digital communications. For the channel in the DMT system separated into self- regulating sub-channels. The full amount of bits transmitted over the channel would be the total amount of the bits transmitted in each sub-channel. The binary input data are passed onto a set of parallel, independent sub-channels, each of which is assigned a fixed number of bits during startup or system initialization. Given the measured SNR of each sub-channel during startup, the number of bits for each sub-channel is then determined [1]. Each sub-channel is encoded into a quadrature amplitude modulation (QAM) constellation of the appropriate size. For example, if four bits are assigned to tone i, then tone i will use a 16QAM constellation for encoding. The modulation function, IFFT, converts the encoded binary data in QAM constellation format from frequency domain to time domain for transmission .The DMT demodulation regress the time domain signal back to frequency domain data. A number of v samples is inserted as a guard period at the start of each DMT symbol of to decrease inter-symbol interference (ISI) at v ≥ L-1, where L is the length of the channel. Intercarrier interference (ICI) can be reduced when the guard period is a cyclic prefix [2]. The guard period reduces the channel throughput by a factor of N/ (N+ v), where N is both the symbol length and FFT length. This factor decreases as v turns into large comparative to N, in order that the presentation failure care for unreasonable. Hence, v is chosen to be relatively small compared to N. In the field, however, ADSL and VDSL channel impulse responses can exceed N/16 samples [3]. DOI : 10.5121/ijnsa.2013.5606 65
  • 2. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 Time-domain equalizer (TEQ) is used for shortening. Accordingly, the DMT equalizer construction consists of a flow of a single TEQ to shorten the L, a fast Fourier transform (FFT) to present multi carrier demodulation, and a single-tap frequency-domain equalizer (FEQ) per tone to correct frequency distortion in the shortened channel. Different DMT TEQ design methods optimize FIR coefficients based on training data under different criteria. The method of Minimum Mean Squared Error (MMSE) design is one of the beneficial methods [4,5,6,7] to minimize the mean square error among the output of the route consisting of the channel and TEQ filter and the output of a controlled rout consisting of a transmission delay and a purpose filter. The method of maximum shortening SNR (MSSNR) [3] deals with a challenge to reduce inter-symbol interference (ISI) in the time domain. The MSSNR method aims at increasing the quotient of the energy of the used channel impulse response within an object window of ν +1 samples to that outer the object window. The Minimum-ISI (Min-ISI) method works by weighting the ISI in the frequency domain [4], for example, to set the ISI in vacant and noisy sub-channels. The traditional joint method of TEQ-FEQ structure equalizes all sub-channels that possibly bound bit rate presentation. An alternate receiver architecture has been proposed in [8], in which to relocate the TEQ procedures to the FEQ. The joint TEQ-FEQ would provide a multi-tap FEQ where each subchannel is discretely equalized. Another alternative structure has been proposed in [9], in which the authors proposed the FEQ transfer to the TEQ to give up complex-valued time-domain equalizer filter banks. Joint equalization methods give up higher data rates for the downstream ADSL task [10]. Multi-carrier modulation (MCM) techniques including discrete multi-tone (DMT) and orthogonal frequency division multiplexing (OFDM) have been used extensively in many wireless network standards, such as IEEE 802.1 la, IEEE 802.16a, and wire-line digital communication systems, such as (ADSL) [11,12,13]. MCMs based on discrete Fourier transform (DFT). They utilize the complex exponential functions group such as orthogonal source. Particularly, in discrete multitone (DMT) systems, modulation by the IFFT and demodulation by the FFT create orthogonal sub-channels [14]. But, the exponential functions are not the rare orthogonal source so as to construct baseband multicarrier signals. A single trigonometric function can be used to perform as an orthogonal source to apply to the MCM system, and this system can be synthesized using a discrete sine transform (DST) [12]. TEQ design methods have more complications, and need a channel approximation. The proposed algorithm in [15] which is a blind adaptive channel shortening algorithm solves the complexity problem. This algorithm has low complexity and is globally convergent with only a small loss in bit rate [15]. So in this paper, we can use the DST; along with its inverse as a replacement for the inverse fast Fourier transform / fast Fourier transform (IFFT/FFT) stages in DMT systems in order to enhance the performance of the algorithm in [15] and achieve a higher bit rate with low complexity. 2. Scheme Design The scheme design is shown in Figure 1. Every one of the N frequency bins is modulated by a QAM signal, while frequently a number of bins are left as unacceptable carriers [4]. Modulation is performed via an IFFT, and demodulation is accomplished via FFT. The TEQ is used to decrease the channel length, and the follow-on reduced efficient channel is matched by a frequency-domain equalizer (FEQ). 66
  • 3. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 Figure 1 . DFT system model. IFFT: modulation, parallel to serial (P/S), add cyclic prefix (CP), eliminate cyclic prefix (xCP) and FFT demodulation. For the conventional DFT-DMT system, the channel input sequence [ x n , fft ] at the output of the IFFT block can be presented as [16] x n , fft = 1 N −1 ⋅∑ Xb ⋅e N b =0 j 2πbn N , n = 0 , 1 , K , N −1 (1) where X b is the encoded bit stream. When adding the CP, the end v samples are identical to the first v samples in the symbol, i.e. x( Mk + i ) = x( Mk + i + N ), i ∈ { , L , v} 1 (2) The symbol period is M = N + v and k is the symbol index. Figure 2 shows an example of this, with N = 8, v= 2, and M = N + v = 10, and the symbol pictured is for k = 0. The received data r is obtained from x by Lh r ( Mk + i ) = ∑ h(l ) ⋅ x( Mk + i − l ) + n( Mk + i ) (3) l =0 67
  • 4. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 Figure 2 . Demonstration of the change in the ISI at the end of the received symbol and at the received CP . and the equalized data y is obtained from r by Lw y ( Mk + i ) = ∑ w ( j ) ⋅ r ( Mk + i − j ) (4) j =0 The channel has Lh + 1 taps, the TEQ has Lw + 1 taps and the effective channel c = h ∗ w has Lc + 1 taps, where Lc = Lh + Lw . 3. Description algorithm of MERRY Consider the example in Figure 2. The broadcasted samples 2 and 10 are the same. But, at the receiver, the interfering samples earlier than sample 2 are not the whole identical to their correspondences before sample 10. If h(2 ), h(3) and h(4 ) were zero, then r (2 ) = r (10) . If we try to force r (2 ) = r (10 ) , we may force h(2 ) = h(3) = h(4 ) = 0, forcing the channel selected the same like the CP. The location of the window of v non-zero taps can be varied by comparing r (3) to r (11) , or r (4 ) to r (12 ) , etc. In general, if the channel length Lh + 1 ≤ v , in that case the previous sample inside the CP must look like the previous sample inside the symbol. Unit cost function that reproduce: [ 2 ] J ∆ = E y (Mk + v + ∆ ) − y (Mk + v + N + ∆ ) , ∆ ∈ {0,L , M − 1} (5) where ∆ is the sign synchronization parameter, which correspond to the preferred delay of the channel-TEQ collection. The choice of ∆ affects the cost function. A randomization gradient descent of Eq.(5) guides to a sightless, adaptive TEQ, because the broadcasted data not require be identified. The proposed MERRY algorithm performs a randomization gradient descent of Eq.(5), with a limitation to keep away from the slight solution w = 0. The MERRY algorithm is summarized as follows: For symbol k = 0,1,2,L , 68
  • 5. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 ~ (k ) = r (Mk + v + ∆ ) − r (Mk + v + N + ∆ ) r e (k )= w T (6) (k )~ (k ) r (7) ~ w(k + 1) = w(k ) − µe(k )~ ∗ (k ) r (8) ~ w(k + 1) w(k + 1) = ~ w(k + 1) (9) where r (i ) = [r (i ), r (i − 1),L , r (i − Lw )] , and ∗ denotes complex conjugation. T Due to the fact that MERRY compares with CP at the last part of the symbol, one update is achievable for each symbol. Interchanging applications of the limitation have set up one tap to unity, retaining a channel approximation and renormalizing to enforce c = 1 instead of w = 1 , or with a retribution term in the cost function to put into effect the norm limitation. 4. DST Implementation Applying the above algorithm to the DST approach solves the complexity problem and achieves higher bit rates than the DFT system. For the proposed DST-DMT system, the channel input sequence { x n , DST } at the output of the IDST block can be presented as [17] 1 x n , DST  2  2 N −1  πb =   ⋅ ∑ Ab ⋅ X b ⋅ sin  (2n + 1)   N  b =0  2N  where  1  Ab =  2 1  , for b = 0 n = 0, 1, L , N − 1 (10) (11) otherwise , and X b is the encoded bit stream. Lh rDST ( Mk + i ) = ∑ h(l ) ⋅ x DST ( Mk + i − l ) + n( Mk + i ) l =0 Lw y DST ( Mk + i ) = ∑ w ( j ) ⋅ rDST ( Mk + i − j ) j =0 69
  • 6. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 IDST DST DST DST Figure 3 DST system model. It is known that the DST has excellent spectral compaction and energy concentration properties (See Fig.(3)). It uses only real arithmetics as opposed to the complex-valued DFT. This reduces the signal processing complexity especially for real pulse-amplitude modulation signaling, where DFT-based processing still uses complex arithmetics and suffers from in-phase/quadrature imbalance problems which can cause appreciable performance degradation [11-18]. The cost function in Eq. (5) can be rewritten as: [ 2 ] J ∆ , DST = E y DST (Mk + v + ∆ ) − y DST (Mk + v + N + ∆ ) , ∆ ∈ {0, L , M − 1} (12) The MERRY algorithm can be rewritten as: For symbol k = 0,1,2, L, ~ (k ) = r (Mk + v + ∆ ) − r (Mk + v + N + ∆ ) rDST DST DST (13) ~ e DST (k ) = wT (k )rDST (k ) DST (14) ~ wDST (k + 1) = wDST (k ) − µe DST (k )~DST (k ) r∗ (15) ~ w (k + 1) wDST (k + 1) = ~ DST wDST (k + 1) (16) where rDST (i ) = [rDST (i ), rDST (i − 1),L , rDST (i − Lw )] , and ∗ denotes complex conjugation. T 5. Simulation parameters We use the standard carrier-serving-area (CSA) loop1 [15] as our test channel. The channel impulse response consists of 512 samples sampled at a rate of 2.208 MHz. Also employ high pass filter at cutoff frequency of 5.4 kHz and pass band ripple of 0.5 dB to the standard loop1 to add the outcome of the splitter by the side of the transmitter. The DC channel (channel 0), channels 15, and the Nyquist channel are not used. The DSL presentation metric is the possible bit rate for a fixed probability of error, 70
  • 7. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013  SNRi  B = ∑ ln1 +  Γ   i (17) When SNRi = 40 dB in frequency bin i , and Γ is the SNR gap ( Γ =9.8 + 6 - 4.2 = 11.6 dB). This corresponds to a system margin of 6 dB and a coding gain of 4.2 dB. Both the FFT size and the DST size are set to N = 512 . We assume that the power allocation is constant over all used sub-channels and that it is not changed after the TEQ is placed into the system. 6. Simulation Results A- for DFT Approach Figure 4 shows simulation results using CSA loop1. The CP size is 32. The FFT length is 512. We have 16 taps for the TEQ. Figure 5 demonstrates a plan for bit rate opposed versus SNR. The Bit rate for this plot was computed by running for 5000 symbols and gradually decreasing the step size over time. For all these SNR values, MERRY approaches the max SSNR solution. Figure 4. Achievable bit rate vs. time for the DFT system. 71
  • 8. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 Figure 5 Achievable bit rate vs. SNR for the DFT system. B- DST System Results As compared to figure 4 for the DFT approach, figure 6 shows the achievable bit rate vs. time for the DST approach at the same simulation parameters. As we can see in the case of DST approach, the performance is better (high bit rate and low complexity) than that of the DFT approach. Also, when comparing figure 5 for the DFT approach with figure 7 for the DST approach, we can see that the DST approach provides a higher bit rate than the DFT approach at the same SNR values. 72
  • 9. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 Figure 6 Achievable bit rate vs. time for the DST system. Figure 7 Achievable bit rate vs. SNR for the DST system. 73
  • 10. International Journal of Network Security & Its Applications (IJNSA), Vol.5, No.6, November 2013 8. Conclusions The proposed IDST/DST has been used for modulation /demodulation stages in DMT systems. Our simulation results show that the DST-DMT system provides a better performance than the DFT-DMT system because of the excellent spectral compaction and energy concentration properties of the DST compared to the DFT. It was concluded that the proposed DST-DMT system achieves higher bit rates as compared with the conventional DFT-DMT system. References [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [12] [13] [14] [15] [16] [17] [18] I. Lee, J. S. Chow, and J. M. Cioffi, "Performance evaluation of a fast computation algorithm for the DMT in high-speed subscriber loop," IEEE J. on Selected Areas in Comm., vol. 13, pp. 1564-1570, Dec. 1995. K. Vanble, M. Moonen, and G. Leus, “Linear and Decision-Feedback Per Tone Equalization for DMT-Based Transmission Over IIR Channels,” I IEEE Transactions Signal Processing, vol. 54, no. 1, Jan. 2006. G. Arslan, B. Lu, L. D. Clark, and B. L. Evans, "Iterative Refinement Methods for Time-Domain Equalizer Design," EURASIP Journal on Applied Signal Processing vol. 2006, pp.1–12, Aug. 2005. G. Arslan, B. L. Evans, and S. Kiaei, “Equalization for Discrete Multitone Transceivers to Maximize Bit Rate,” IEEE Transactions Signal Processing, vol. 49, no. 12, pp. 3123–3135, 2001. J. S. Chow and J. M. Cioffi, "A cost-effective maximum likelihood receiver for June multicarrier systems," in Proc. IEEE Int. Conf. Comm., vol. 2, (Chicago, IL), pp. 948- 952,1992. J. S. Chow, J. M. Cioffi, and J. A. Bingham, "Equalizer training algorithms for multicarrier modulation systems," in Proc. IEEE Int. Conf. Comm., vol. 2, (Geneva, Switzerland), pp. 761-765, May 1993. N. Al-Dhahir and J. M. Cioffi, "Efficiently computed reduced-parameter input-aided MMSE equalizers for ML detection: A unified approach," IEEE Trans. on Info. Theory,vol. 42, pp. 903-915, May 1996 K. Van Acker, G. Leus, M. Moonen, O. van de Wiel, and T. Pollet, “Per Tone no.1, pp. Equalization for DMT-based Systems,” IEEE Transactions on Communications, vol. 49,109–119, 2001. M. Ding, Z. Shen, and B. L. Evans, “An Achievable Performance Upper Bound for Discrete Multi Tone Equalization,” in Proceedings of IEEE Global Telecommunications Conference (GLOBECOM ’04), vol. 4, pp. 2297–2301, Dallas, Tex, USA, November–December 2004. R. K. Martin, K. Vanbleu, M. Ding, et al., “Unification and Evaluation of Equalization Structures and Design Algorithms for Discrete Multi-tone Modulation Systems,” IEEE Transactions Signal Processing, vol. 53, no. 10, part 1, pp. 3880–3894, 2005. [11] A. Rushdi and J. Tuqan, "PAPR Reduction in Trigonometric-Based OFDM Systems," IEEE Signals, Systems and Computers, Conference Record of the Forty-First Asiloma Conference pp.1747–1751, Nov. 2007. P. Tan, and N. C. Beaulieu, "A Comparison of DCT-Based OFDM and DFT-Based OFDM in Frequency Offset and Fading Channels," IEEE Transactions on Communications, vol. 54, no. 11, pp. 2113–2125, Nov. 2006. P. Tan, and N. C. Beaulieu, "An Improved DCT-Based OFDM Data Transmission Scheme," Personal, Indoor and Mobile Radio Communications, IEEE 16th International Symposium, pp.745–749, Sept. 2005. E. Khan, and C. Heneghan, "Iterative Refinement Methods for Time-Domain Equalizer Design," International Journal of Signal Processing, pp.126–130, 2006. R. K. Martin, J. Balakrishnan, W. A. Sethares, and C. R. Johnson, Jr., “A Blind, Adaptive TEQ for Multicarrier Systems," IEEE Signal Processing Letters, vol. 9, no. 11, pp. 341{343, Nov. 2002. A.-Y. Wu T.-S. Chan, "Cost-efficient Parallel Lattice VLSI Architecture for the IFFT/FFT in DMT Transceiver Technology," IEEE, pp. 3517-3520, 1998. A. B. Watson, "Image Compression Using the Discrete Cosine Transform," Mathematica Journal, 4(1), 1994, p. 81-88. P. Tan, N. C. Beaulieu, “A Comparison of DCT-Based OFDM and DFT-Based OFDM in frequency offset and fading channels,” IEEE Trans. On Commun., vol. 54, no. 11, Nov.2006. 74