Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6950128
G. Esakkirajan, C. Annadurai
CORDIC or CO-ordinate Rotation Digital Computer is a fast, simple, efficient and powerful algorithm used in Digital Signal Processing applications. In this paper, we extend the methodology for designing a low-power area-efficient DCT for image compression using only shift registers, and adders/ sub tractors and special interconnections. Through hardware synthesis we proved that shift and add based DCT computation is efficient one over conventional multiplier based approach and finally accuracy was measured by comparing PSNR value of reconstructed image with original image using MATLAB.
{"title":"CORDIC based high speed DCT algorithm","authors":"G. Esakkirajan, C. Annadurai","doi":"10.1109/ICCSP.2014.6950128","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950128","url":null,"abstract":"CORDIC or CO-ordinate Rotation Digital Computer is a fast, simple, efficient and powerful algorithm used in Digital Signal Processing applications. In this paper, we extend the methodology for designing a low-power area-efficient DCT for image compression using only shift registers, and adders/ sub tractors and special interconnections. Through hardware synthesis we proved that shift and add based DCT computation is efficient one over conventional multiplier based approach and finally accuracy was measured by comparing PSNR value of reconstructed image with original image using MATLAB.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116601883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6949814
A. Devi, S. Prince
Visible light communication is a data communication medium, uses the light spectrum between 390nm-700nm. LEDs are used for data transmission along with illumination purpose in visible light communication (VLC). LEDs can easily switch ON and OFF with logical `1' & `0' and data can be sent serially. There are many areas where we can implement VLC but one of the promising stretches that could possibly revolutionize the telecommunication industry is deployment of optical wireless in GSM system. Because of the restriction of Radio Frequency (RF) in some places like hospitals, airplane, petrol stations etc. VLC can be used as an alternative solution for those. The main aim of this project is to design and analyses the optical wireless system to provide connectivity to users in low restricted RF region. A prototype model of the Radio on visible light (RoVL) is proposed to be developed and tested.
{"title":"Design and implementation of a Radio on visible light system for indoor communication","authors":"A. Devi, S. Prince","doi":"10.1109/ICCSP.2014.6949814","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949814","url":null,"abstract":"Visible light communication is a data communication medium, uses the light spectrum between 390nm-700nm. LEDs are used for data transmission along with illumination purpose in visible light communication (VLC). LEDs can easily switch ON and OFF with logical `1' & `0' and data can be sent serially. There are many areas where we can implement VLC but one of the promising stretches that could possibly revolutionize the telecommunication industry is deployment of optical wireless in GSM system. Because of the restriction of Radio Frequency (RF) in some places like hospitals, airplane, petrol stations etc. VLC can be used as an alternative solution for those. The main aim of this project is to design and analyses the optical wireless system to provide connectivity to users in low restricted RF region. A prototype model of the Radio on visible light (RoVL) is proposed to be developed and tested.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115112746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6950038
Rajamanickam Murugesan, M. Saravanan, Mariappan Vijyaraj
The exodus to Wireless networks from wired network is a growing field in the past few decades. Various wireless applications are made up of mobility and scalability based nodes. Among all the wireless networks Mobile Ad-Hoc network is one of the most significant and distinctive applications today. All the nodes are self employed, not fixed on a fixed network infrastructure, and it can act as sender as well as receiver, and directly communicate to the other nodes in the network within the communication range of the network. Also the nodes in the Wireless network can act as relay nodes to their neighbors to relay messages. Since the nodes in the Wireless Network having the ability to self-configuring by them, they are deployed in critical mission based applications like military usage or any kind of emergency recovery. Since the open medium and wide distribution of nodes make the network vulnerable to malicious attackers. In such situations, it is necessary to deploy an effective IDS mechanism to prevent or protect the Network from attacks. In the existing system EAACK - [Enhanced Adaptive Acknowledgement] is proposed as an IDS and it especially designed for MANET. In this paper a combined IP-trace back with E2AACK - [End-to-End Adaptive Acknowledgment] mechanism is proposed to detect and prevent the malicious nodes in the network. The malicious node activity can be detected by IP-trace back and prevented by getting acknowledgement from both end nodes. The simulation result shows that the E2AACK approach provides higher detection rate and prevention which greatly affect the network performance in terms of throughput and delay.
{"title":"A node authentication clustering based security for ADHOC network","authors":"Rajamanickam Murugesan, M. Saravanan, Mariappan Vijyaraj","doi":"10.1109/ICCSP.2014.6950038","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950038","url":null,"abstract":"The exodus to Wireless networks from wired network is a growing field in the past few decades. Various wireless applications are made up of mobility and scalability based nodes. Among all the wireless networks Mobile Ad-Hoc network is one of the most significant and distinctive applications today. All the nodes are self employed, not fixed on a fixed network infrastructure, and it can act as sender as well as receiver, and directly communicate to the other nodes in the network within the communication range of the network. Also the nodes in the Wireless network can act as relay nodes to their neighbors to relay messages. Since the nodes in the Wireless Network having the ability to self-configuring by them, they are deployed in critical mission based applications like military usage or any kind of emergency recovery. Since the open medium and wide distribution of nodes make the network vulnerable to malicious attackers. In such situations, it is necessary to deploy an effective IDS mechanism to prevent or protect the Network from attacks. In the existing system EAACK - [Enhanced Adaptive Acknowledgement] is proposed as an IDS and it especially designed for MANET. In this paper a combined IP-trace back with E2AACK - [End-to-End Adaptive Acknowledgment] mechanism is proposed to detect and prevent the malicious nodes in the network. The malicious node activity can be detected by IP-trace back and prevented by getting acknowledgement from both end nodes. The simulation result shows that the E2AACK approach provides higher detection rate and prevention which greatly affect the network performance in terms of throughput and delay.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116283816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6949842
T. Panse, Kshitij Saratkar
This paper presents the technique for designing the area efficient trellis code modulation encoder and decoder. One of the best encoding techniques is convolutional encoding as convolutional encoding improves the error performance of communicational channel. The trellis code modulation (TCM) can achieve the better error performance without Bandwidth expansion. Viterbi decoder is use in Trellis code modulation, to decode a data which is encoded by a convolutional encoder. Here TCM encoder and decoder are designed by using Xilinx ISE 13.2 design software and device use is Spartan 6. Proposed technique is aims to reduce the hardware requires for designing the TCM decoder by using hybrid register exchange method. Hybrid register exchange method (HREM) is a combination of the register exchange method (REM) and Traceback (TB) technique. HREM is superior as compared to Register Exchange Method (REM) and Traceback method (TB), where area requires for designing of survivor memory unit is more as compare to the proposed technique.
本文介绍了面积高效栅格码调制编解码器的设计技术。卷积编码是最好的编码技术之一,因为卷积编码改善了通信信道的误差性能。网格编码调制(TCM)在不需要带宽扩展的情况下可以获得较好的误码性能。维特比解码器用于栅格编码调制,用于解码由卷积编码器编码的数据。本文采用Xilinx ISE 13.2设计软件设计TCM编码器和解码器,设备使用Spartan 6。该技术旨在利用混合寄存器交换方法降低TCM译码器的硬件设计要求。混合寄存器交换方法(HREM)是寄存器交换方法(REM)和回溯技术(TB)的结合。与寄存器交换法(REM)和回溯法(TB)相比,HREM具有更大的优势,这两种方法对幸存者存储单元的设计面积要求更高。
{"title":"Design of Trellis code modulation decoder using Hybrid Register Exchange Method","authors":"T. Panse, Kshitij Saratkar","doi":"10.1109/ICCSP.2014.6949842","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949842","url":null,"abstract":"This paper presents the technique for designing the area efficient trellis code modulation encoder and decoder. One of the best encoding techniques is convolutional encoding as convolutional encoding improves the error performance of communicational channel. The trellis code modulation (TCM) can achieve the better error performance without Bandwidth expansion. Viterbi decoder is use in Trellis code modulation, to decode a data which is encoded by a convolutional encoder. Here TCM encoder and decoder are designed by using Xilinx ISE 13.2 design software and device use is Spartan 6. Proposed technique is aims to reduce the hardware requires for designing the TCM decoder by using hybrid register exchange method. Hybrid register exchange method (HREM) is a combination of the register exchange method (REM) and Traceback (TB) technique. HREM is superior as compared to Register Exchange Method (REM) and Traceback method (TB), where area requires for designing of survivor memory unit is more as compare to the proposed technique.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121675262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6949953
N. Madhusudhanan, L. Nithyanandan
Deploying compress-and-forward relay nodes is a promising and better solution for LTE-A networks to meet the capacity and coverage requirements of 4G and beyond systems. However, selecting a relay plays an important role in enhancing the benefits. In this paper, a compress-and-forward relay is proposed using polar codes which achieves better performance than turbo codes, but more importantly with less time complexity and reduced processing delay. Simulation results proved a major improvement of the system performance in terms of block error rate and processing delay.
{"title":"Compress-and-forward relaying with polar codes for LTE-A system","authors":"N. Madhusudhanan, L. Nithyanandan","doi":"10.1109/ICCSP.2014.6949953","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949953","url":null,"abstract":"Deploying compress-and-forward relay nodes is a promising and better solution for LTE-A networks to meet the capacity and coverage requirements of 4G and beyond systems. However, selecting a relay plays an important role in enhancing the benefits. In this paper, a compress-and-forward relay is proposed using polar codes which achieves better performance than turbo codes, but more importantly with less time complexity and reduced processing delay. Simulation results proved a major improvement of the system performance in terms of block error rate and processing delay.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"442 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123276717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6950148
S. Muthukumar, V. Nagarajan
Cooperative diversity effectively mitigates the fading effect in wireless communication. The system with a source, a destination and the multiple relays is considered for performance analysis. The relay with best channel conditions perform the Decode and Forward (DF) relaying in distributed manner. Then the receiver combines the received signal with the full Channel State Information (CSI) using Maximum Ratio Combining (MRC) for the received instantaneous Signal to Noise Ratio (SNR) of source-relay channel greater than the SNR of relay-destination channel, otherwise Selection Combining (SC) is used to select the channel with maximum SNR. The end-to-end Symbol Error Probability (SEP) with DF relaying for QPSK symbol using proposed combining techniques is derived in closed form, the results shows proposed adaptive combining has better performance than the conventional cooperation scheme.
{"title":"Performance analysis of adaptive maximal ratio/ selection combining based on full CSI and maximum flow constraint","authors":"S. Muthukumar, V. Nagarajan","doi":"10.1109/ICCSP.2014.6950148","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950148","url":null,"abstract":"Cooperative diversity effectively mitigates the fading effect in wireless communication. The system with a source, a destination and the multiple relays is considered for performance analysis. The relay with best channel conditions perform the Decode and Forward (DF) relaying in distributed manner. Then the receiver combines the received signal with the full Channel State Information (CSI) using Maximum Ratio Combining (MRC) for the received instantaneous Signal to Noise Ratio (SNR) of source-relay channel greater than the SNR of relay-destination channel, otherwise Selection Combining (SC) is used to select the channel with maximum SNR. The end-to-end Symbol Error Probability (SEP) with DF relaying for QPSK symbol using proposed combining techniques is derived in closed form, the results shows proposed adaptive combining has better performance than the conventional cooperation scheme.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124605918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6949893
Krishna Bala, K. Nallagatja, G. R. Vinoth Babu, Bibin Reddy, John Baby
In this paper, a new adaptive HAST scheme is proposed for Space Frequency Block Coded (SFBC)-Orthogonal Frequency Division Multiplexing (OFDM) system. This HAST scheme uses subcarrier by subcarrier antenna selection. The performance of the proposed scheme is analyzed for different antenna configurations with average Signal to Noise Ratio (SNR) gain and Bit Error Rate (BER) parameters. The simulation results prove that the performance of conventional SFBC-OFDM system is greatly improved with the proposed scheme.
{"title":"Hybrid antenna selection at transmitter (HAST) scheme for future broadband wireless system","authors":"Krishna Bala, K. Nallagatja, G. R. Vinoth Babu, Bibin Reddy, John Baby","doi":"10.1109/ICCSP.2014.6949893","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949893","url":null,"abstract":"In this paper, a new adaptive HAST scheme is proposed for Space Frequency Block Coded (SFBC)-Orthogonal Frequency Division Multiplexing (OFDM) system. This HAST scheme uses subcarrier by subcarrier antenna selection. The performance of the proposed scheme is analyzed for different antenna configurations with average Signal to Noise Ratio (SNR) gain and Bit Error Rate (BER) parameters. The simulation results prove that the performance of conventional SFBC-OFDM system is greatly improved with the proposed scheme.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125374183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6949965
Aniket V. Kale, Sanket A. Bankar, S. Jagtap
Using Microchip's Peripheral Interface Controller (PIC) microcontroller and the Current Transducer (CT), we have designed data acquisition module (DAQ). The present paper describes the design of a cost effective, better resolution, simple structure and high reliability features. Data acquisition system is compatible to most of the PC and laptops and its design is interfaced to the serial port of the PC in which data converted and passed on to the computer. Laboratory Virtual Instrument Engineering Workbench (Lab VIEW) application on the computer acquires the data and plots on the appropriate graph and indicators of respective transducers.
{"title":"Design of PIC microcontroller-based data acquisition module with lab VIEW interfacing","authors":"Aniket V. Kale, Sanket A. Bankar, S. Jagtap","doi":"10.1109/ICCSP.2014.6949965","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949965","url":null,"abstract":"Using Microchip's Peripheral Interface Controller (PIC) microcontroller and the Current Transducer (CT), we have designed data acquisition module (DAQ). The present paper describes the design of a cost effective, better resolution, simple structure and high reliability features. Data acquisition system is compatible to most of the PC and laptops and its design is interfaced to the serial port of the PC in which data converted and passed on to the computer. Laboratory Virtual Instrument Engineering Workbench (Lab VIEW) application on the computer acquires the data and plots on the appropriate graph and indicators of respective transducers.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121329842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6949984
M. Saranya, S. Sathya
Multiple input multiple output (MIMO) systems have been shown to have tremendous potential in increasing the average throughput in cellular wireless communication systems. Improve the achievable rates of Gaussian MIMO interference channels (ICs) with additive white Gaussian noise (AWGN), when improper or circularly asymmetric complex Gaussian signaling is applied. For the MIMO-IC, the interference treated as Gaussian noise, show that the user's achievable rate can be expressed as a summation of the rate achievable by the conventional proper or circularly symmetric complex Gaussian signaling in terms of the users' transmit covariance matrices, and an additional term, which is a function of both the users' transmit covariance and pseudo-covariance matrices. The additional degrees of freedom in the pseudo-covariance matrix, which is conventionally set to be zero for the case of proper Gaussian signaling, provide an opportunity to further improve the achievable rates of Gaussian MIMO-ICs by employing improper Gaussian signaling. Propose an algorithm to design optimal transmission for k users with channel state information. Then maximize the Weighted sum rate(WSR) of MIMO Interference channels to provide Minimum Weighted Sum Mean Squared Error (MWSMSE). And proposes widely linear precoding, which efficiently maps proper information-bearing signals to improper transmitted signals at each transmitter. Joint and separate covariance, pseudo-covariance optimization algorithm is also proposed. Which guarantees the rate improvement over conventional proper Gaussian signaling.
{"title":"Optimized transmission for multiple input multiple output interference channel with additive white Gaussian noise","authors":"M. Saranya, S. Sathya","doi":"10.1109/ICCSP.2014.6949984","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949984","url":null,"abstract":"Multiple input multiple output (MIMO) systems have been shown to have tremendous potential in increasing the average throughput in cellular wireless communication systems. Improve the achievable rates of Gaussian MIMO interference channels (ICs) with additive white Gaussian noise (AWGN), when improper or circularly asymmetric complex Gaussian signaling is applied. For the MIMO-IC, the interference treated as Gaussian noise, show that the user's achievable rate can be expressed as a summation of the rate achievable by the conventional proper or circularly symmetric complex Gaussian signaling in terms of the users' transmit covariance matrices, and an additional term, which is a function of both the users' transmit covariance and pseudo-covariance matrices. The additional degrees of freedom in the pseudo-covariance matrix, which is conventionally set to be zero for the case of proper Gaussian signaling, provide an opportunity to further improve the achievable rates of Gaussian MIMO-ICs by employing improper Gaussian signaling. Propose an algorithm to design optimal transmission for k users with channel state information. Then maximize the Weighted sum rate(WSR) of MIMO Interference channels to provide Minimum Weighted Sum Mean Squared Error (MWSMSE). And proposes widely linear precoding, which efficiently maps proper information-bearing signals to improper transmitted signals at each transmitter. Joint and separate covariance, pseudo-covariance optimization algorithm is also proposed. Which guarantees the rate improvement over conventional proper Gaussian signaling.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121453399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6949914
Komal Punia, Emy Mariam George, K. Vinoth Babu, G. Ramachandra Reddy
High-data-rate transmission can be achieved by Spatially Multiplexed (SM) MIMO systems. Spatial demultiplexing at the receiver end is a difficult task. Thus, several research works has been developed for demultiplexing and decoding. In this paper three signal detection methods namely Zero-Forcing (ZF), Minimum Mean Squared Error (MMSE) and Maximum Likelihood (ML) are implemented. In Zero-Forcing method, noise enhancement is the problem. The complexity of implementing ZF and MMSE is much low but their performance is remarkably inferior to ML detection. Many active researchers are done to develop the signal detection methods based on the ML detection criterion while still aimed to achieve a near-optimal performance with low complexity. The comparative study of three methods is done in relevance to three digital modulation schemes namely Binary Phase Shift Keying (BPSK), Quadrature Phase Shift Keying (QPSK) and 16-Quadrature Amplitude Modulation (QAM). Simulation results also state that ML gives better performance as compared to ZF and MMSE detection methods.
空间复用(SM) MIMO系统可以实现高数据速率传输。接收端的空间解复用是一项困难的任务。因此,一些研究工作已经发展为解复用和解码。本文实现了零强迫(Zero-Forcing, ZF)、最小均方误差(Minimum Mean Squared Error, MMSE)和最大似然(Maximum Likelihood, ML)三种信号检测方法。在零强迫方法中,噪声增强是一个问题。实现ZF和MMSE的复杂性要低得多,但它们的性能明显不如ML检测。许多活跃的研究人员都在开发基于机器学习检测标准的信号检测方法,同时仍然旨在以低复杂度实现接近最优的性能。针对二值相移键控(BPSK)、正交相移键控(QPSK)和16正交调幅(QAM)三种数字调制方案,对三种方法进行了比较研究。仿真结果还表明,与ZF和MMSE检测方法相比,ML具有更好的性能。
{"title":"Signal detection for Spatially Multiplexed multi input multi output (MIMO) systems","authors":"Komal Punia, Emy Mariam George, K. Vinoth Babu, G. Ramachandra Reddy","doi":"10.1109/ICCSP.2014.6949914","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949914","url":null,"abstract":"High-data-rate transmission can be achieved by Spatially Multiplexed (SM) MIMO systems. Spatial demultiplexing at the receiver end is a difficult task. Thus, several research works has been developed for demultiplexing and decoding. In this paper three signal detection methods namely Zero-Forcing (ZF), Minimum Mean Squared Error (MMSE) and Maximum Likelihood (ML) are implemented. In Zero-Forcing method, noise enhancement is the problem. The complexity of implementing ZF and MMSE is much low but their performance is remarkably inferior to ML detection. Many active researchers are done to develop the signal detection methods based on the ML detection criterion while still aimed to achieve a near-optimal performance with low complexity. The comparative study of three methods is done in relevance to three digital modulation schemes namely Binary Phase Shift Keying (BPSK), Quadrature Phase Shift Keying (QPSK) and 16-Quadrature Amplitude Modulation (QAM). Simulation results also state that ML gives better performance as compared to ZF and MMSE detection methods.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124175752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}