Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6949938
K. Muralidhar, N. Bharathi
Cooperative communication uses other communication devices to relay transmission. Relay selection plays a vital in improving the performance of cooperative communication. Some works have been done on relay selection in cooperative communications. This research proposes a new practice for selecting the optimal relay in cooperative communication. The proposed work considers RSSI, residual energy and the distance factors i.e., the “suitability” score is based on the above three measures, which can be used to determine the relay node. Since when the potential relay say x is closer to the destination, the channel quality between them is better, moreover fewer collisions would occur as there are less number of potential relays closer to the destination than x and selecting the node with sufficient residual energy as relay would withstand throughout the duration of retransmission.
{"title":"A relay selection mechanism using RED factors for cooperative communications in mobile ad-hoc networks","authors":"K. Muralidhar, N. Bharathi","doi":"10.1109/ICCSP.2014.6949938","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949938","url":null,"abstract":"Cooperative communication uses other communication devices to relay transmission. Relay selection plays a vital in improving the performance of cooperative communication. Some works have been done on relay selection in cooperative communications. This research proposes a new practice for selecting the optimal relay in cooperative communication. The proposed work considers RSSI, residual energy and the distance factors i.e., the “suitability” score is based on the above three measures, which can be used to determine the relay node. Since when the potential relay say x is closer to the destination, the channel quality between them is better, moreover fewer collisions would occur as there are less number of potential relays closer to the destination than x and selecting the node with sufficient residual energy as relay would withstand throughout the duration of retransmission.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125898624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6949879
Prajakta R. Nehare, Yogita K. Dubey, M. Mushrif
In this paper, a method for image segmentation using multiscale intuitionistic fuzzy roughness measure is proposed. The traditional roughness measure tends to over-focus on the little important homogeneous regions but is not accurate enough to measure the homogeneity in an image. By applying the theories of scale-space and using intuitionistic fuzzy representation for images, roughness is measured under multiple scales. Multiscale representation can tolerate the disturbance of trivial regions, and intuitionistic fuzzy representation deals with hesitancy in image boundary, therefore produces precise segmentation results.
{"title":"Multiscale intuitionistic fuzzy roughness measure for image segmentation","authors":"Prajakta R. Nehare, Yogita K. Dubey, M. Mushrif","doi":"10.1109/ICCSP.2014.6949879","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949879","url":null,"abstract":"In this paper, a method for image segmentation using multiscale intuitionistic fuzzy roughness measure is proposed. The traditional roughness measure tends to over-focus on the little important homogeneous regions but is not accurate enough to measure the homogeneity in an image. By applying the theories of scale-space and using intuitionistic fuzzy representation for images, roughness is measured under multiple scales. Multiscale representation can tolerate the disturbance of trivial regions, and intuitionistic fuzzy representation deals with hesitancy in image boundary, therefore produces precise segmentation results.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129858112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6949988
Sneha Johnson, J. Mangaiyarkarasi, P. H. Rao
A miniaturized dual fed circularly polarized square patch antenna is presented. The miniaturization is accomplished by loading one of the feed lines with a complementary triangular split ring resonator (CTSRR). Phase characteristics of CTSRR are optimized to realize a miniaturized feed line and axial ratio less than 3dB over the band. Proposed configuration exhibits a return loss of 10.5dB, gain of 4.7dB and axial ratio of 2.8dB at 4 GHz. A miniaturization of the order of 50% is achieved using CTSRR loaded configuration when compared to the conventional configuration.
{"title":"Complementary triangular split ring resonator (CTSRR) loaded circularly polarized planar antenna","authors":"Sneha Johnson, J. Mangaiyarkarasi, P. H. Rao","doi":"10.1109/ICCSP.2014.6949988","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949988","url":null,"abstract":"A miniaturized dual fed circularly polarized square patch antenna is presented. The miniaturization is accomplished by loading one of the feed lines with a complementary triangular split ring resonator (CTSRR). Phase characteristics of CTSRR are optimized to realize a miniaturized feed line and axial ratio less than 3dB over the band. Proposed configuration exhibits a return loss of 10.5dB, gain of 4.7dB and axial ratio of 2.8dB at 4 GHz. A miniaturization of the order of 50% is achieved using CTSRR loaded configuration when compared to the conventional configuration.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129314698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6949811
S. Raguvaran
Wireless ad hoc networks are defenceless to uniqueness based assaults because they don't have the centralized server to control the communication nodes in the network, so many attacks like injecting the malicious nodes by adversaries, false identity creation for nodes and also including spoofing attacks, such that drastically collision or reduce the overall routine of wireless networks. Conservatively, make confident the uniqueness of the conversationalist and perceiving an adversarial or attackers presence is executed through cryptographic validation. Unfortunately, verification of the uniqueness or identity is not constantly enviable as it necessitates key service management, and also coupled with extra infrastructural visual projection and more general calculations. So that it has been proposed, which are corresponding to validate and can perceive wireless device spoofing with diminutive or no dependency on cryptographic technique i.e., without using the digital signature. So that we proposed the efficient algorithm to identify the spoofing or mockery of information and these kind of attacks in the wireless networks. There are many techniques proposed previously to tackle the false information injection, Identity theft attacks and IP spoofing in the wireless networks. In order to overcome the obstacles in the previously proposed methods, we implement effective algorithm for the authentication process or verification and filtering of the MAC addresses of the Roger wireless devices. Our proposed method has consisted of two main implementation parts to address the spoofing attacks. One part is to identify the uniqueness of the client address and other is to make the modification access point control list in each client. Through our proposed technique, recognize of spoofing or mockery of information attacks in wireless networks in the effective way and also helps to identify the adversaries using same uniqueness of the nodes in the wireless networks. Our proposed model can be explored added to get better the accuracy of determining the attacks in the wireless networks, by using non cryptographic technique when compared to others. Our proposed scheme works effectively when compared to the previous system is shown through our implementation and results.
{"title":"Spoofing attack: Preventing in wireless networks","authors":"S. Raguvaran","doi":"10.1109/ICCSP.2014.6949811","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949811","url":null,"abstract":"Wireless ad hoc networks are defenceless to uniqueness based assaults because they don't have the centralized server to control the communication nodes in the network, so many attacks like injecting the malicious nodes by adversaries, false identity creation for nodes and also including spoofing attacks, such that drastically collision or reduce the overall routine of wireless networks. Conservatively, make confident the uniqueness of the conversationalist and perceiving an adversarial or attackers presence is executed through cryptographic validation. Unfortunately, verification of the uniqueness or identity is not constantly enviable as it necessitates key service management, and also coupled with extra infrastructural visual projection and more general calculations. So that it has been proposed, which are corresponding to validate and can perceive wireless device spoofing with diminutive or no dependency on cryptographic technique i.e., without using the digital signature. So that we proposed the efficient algorithm to identify the spoofing or mockery of information and these kind of attacks in the wireless networks. There are many techniques proposed previously to tackle the false information injection, Identity theft attacks and IP spoofing in the wireless networks. In order to overcome the obstacles in the previously proposed methods, we implement effective algorithm for the authentication process or verification and filtering of the MAC addresses of the Roger wireless devices. Our proposed method has consisted of two main implementation parts to address the spoofing attacks. One part is to identify the uniqueness of the client address and other is to make the modification access point control list in each client. Through our proposed technique, recognize of spoofing or mockery of information attacks in wireless networks in the effective way and also helps to identify the adversaries using same uniqueness of the nodes in the wireless networks. Our proposed model can be explored added to get better the accuracy of determining the attacks in the wireless networks, by using non cryptographic technique when compared to others. Our proposed scheme works effectively when compared to the previous system is shown through our implementation and results.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129693220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6949802
B. Panda, Asutosh Kar, M. Chandra
Voice communication today has become an indispensable part of human lives. Long distance communication is as crucial as face to face conversation. Hence, the issue of speech quality needs to be addressed with utmost priority. In this paper, the importance of voice communication over long distance is discussed. Then the analysis proceeds with the thorough study of an acoustic environment with the presence of acoustic echo in the scenario. Subsequently, the nonlinear acoustic echo is studied along with the difficulties that need to be tackled with to ensure its effective cancellation without causing harm to the significant voice data that need to be transmitted. Finally, various methods to find the non-linearity are presented with the thorough comparison of the existing nonlinear acoustic echo cancellation algorithms.
{"title":"Non-linear adaptive echo supression algorithms: A technical survey","authors":"B. Panda, Asutosh Kar, M. Chandra","doi":"10.1109/ICCSP.2014.6949802","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949802","url":null,"abstract":"Voice communication today has become an indispensable part of human lives. Long distance communication is as crucial as face to face conversation. Hence, the issue of speech quality needs to be addressed with utmost priority. In this paper, the importance of voice communication over long distance is discussed. Then the analysis proceeds with the thorough study of an acoustic environment with the presence of acoustic echo in the scenario. Subsequently, the nonlinear acoustic echo is studied along with the difficulties that need to be tackled with to ensure its effective cancellation without causing harm to the significant voice data that need to be transmitted. Finally, various methods to find the non-linearity are presented with the thorough comparison of the existing nonlinear acoustic echo cancellation algorithms.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128015672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6950148
S. Muthukumar, V. Nagarajan
Cooperative diversity effectively mitigates the fading effect in wireless communication. The system with a source, a destination and the multiple relays is considered for performance analysis. The relay with best channel conditions perform the Decode and Forward (DF) relaying in distributed manner. Then the receiver combines the received signal with the full Channel State Information (CSI) using Maximum Ratio Combining (MRC) for the received instantaneous Signal to Noise Ratio (SNR) of source-relay channel greater than the SNR of relay-destination channel, otherwise Selection Combining (SC) is used to select the channel with maximum SNR. The end-to-end Symbol Error Probability (SEP) with DF relaying for QPSK symbol using proposed combining techniques is derived in closed form, the results shows proposed adaptive combining has better performance than the conventional cooperation scheme.
{"title":"Performance analysis of adaptive maximal ratio/ selection combining based on full CSI and maximum flow constraint","authors":"S. Muthukumar, V. Nagarajan","doi":"10.1109/ICCSP.2014.6950148","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6950148","url":null,"abstract":"Cooperative diversity effectively mitigates the fading effect in wireless communication. The system with a source, a destination and the multiple relays is considered for performance analysis. The relay with best channel conditions perform the Decode and Forward (DF) relaying in distributed manner. Then the receiver combines the received signal with the full Channel State Information (CSI) using Maximum Ratio Combining (MRC) for the received instantaneous Signal to Noise Ratio (SNR) of source-relay channel greater than the SNR of relay-destination channel, otherwise Selection Combining (SC) is used to select the channel with maximum SNR. The end-to-end Symbol Error Probability (SEP) with DF relaying for QPSK symbol using proposed combining techniques is derived in closed form, the results shows proposed adaptive combining has better performance than the conventional cooperation scheme.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124605918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6949880
R. Megha, K. A. Pradeepkumar
The need for a high speed and low power ADC is very essential for various applications. Flash ADCs are always the architecture choice where maximum sample rate and moderate resolution is needed. Even though flash ADC is the fastest type available it takes enormous amount of IC real estate to implement. The main disadvantage of flash ADC is that it need large area and dissipate large amount of power. To overcome this complexity number of comparators are reducing by using multiplexers. Here the multiplexers are used to generate reference voltages. A 4-bit CMOS based flash ADC is presenting, which uses reduced comparator and multiplexer based architecture. Here both the analog and the digital parts of the proposed ADC are completely modified. This architecture uses only 4 comparators for a 4 bit ADC. This 4-bit ADC is designed and simulated in Hspice with 1.2 V supply voltage.
{"title":"Implementation of low power flash ADC by reducing comparators","authors":"R. Megha, K. A. Pradeepkumar","doi":"10.1109/ICCSP.2014.6949880","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949880","url":null,"abstract":"The need for a high speed and low power ADC is very essential for various applications. Flash ADCs are always the architecture choice where maximum sample rate and moderate resolution is needed. Even though flash ADC is the fastest type available it takes enormous amount of IC real estate to implement. The main disadvantage of flash ADC is that it need large area and dissipate large amount of power. To overcome this complexity number of comparators are reducing by using multiplexers. Here the multiplexers are used to generate reference voltages. A 4-bit CMOS based flash ADC is presenting, which uses reduced comparator and multiplexer based architecture. Here both the analog and the digital parts of the proposed ADC are completely modified. This architecture uses only 4 comparators for a 4 bit ADC. This 4-bit ADC is designed and simulated in Hspice with 1.2 V supply voltage.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130158454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6949768
S. Surendhar, P. Thirumurugan, S. Sasikumar
In this paper, a novel switching mean filter using cloud algorithm method is proposed, which is a powerful impulse noise removal method. We employ an efficient impulse noise detector to detect the noisy pixels and proposed cloud impulse noise removal algorithm to reconstruct the intensity value of noise pixels. Extensive experimental results demonstrate that our method can obtain better performances in terms of both subjective and objective evaluations than those state-of-the-art impulse denoising techniques. Especially, the proposed method can preserve edges very well while removing impulse noise. Since our algorithm is simple, it is very suitable to be applied to real-time applications.
{"title":"Performance analysis of impulse noise removal using cloud algorithm","authors":"S. Surendhar, P. Thirumurugan, S. Sasikumar","doi":"10.1109/ICCSP.2014.6949768","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949768","url":null,"abstract":"In this paper, a novel switching mean filter using cloud algorithm method is proposed, which is a powerful impulse noise removal method. We employ an efficient impulse noise detector to detect the noisy pixels and proposed cloud impulse noise removal algorithm to reconstruct the intensity value of noise pixels. Extensive experimental results demonstrate that our method can obtain better performances in terms of both subjective and objective evaluations than those state-of-the-art impulse denoising techniques. Especially, the proposed method can preserve edges very well while removing impulse noise. Since our algorithm is simple, it is very suitable to be applied to real-time applications.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128910523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6949842
T. Panse, Kshitij Saratkar
This paper presents the technique for designing the area efficient trellis code modulation encoder and decoder. One of the best encoding techniques is convolutional encoding as convolutional encoding improves the error performance of communicational channel. The trellis code modulation (TCM) can achieve the better error performance without Bandwidth expansion. Viterbi decoder is use in Trellis code modulation, to decode a data which is encoded by a convolutional encoder. Here TCM encoder and decoder are designed by using Xilinx ISE 13.2 design software and device use is Spartan 6. Proposed technique is aims to reduce the hardware requires for designing the TCM decoder by using hybrid register exchange method. Hybrid register exchange method (HREM) is a combination of the register exchange method (REM) and Traceback (TB) technique. HREM is superior as compared to Register Exchange Method (REM) and Traceback method (TB), where area requires for designing of survivor memory unit is more as compare to the proposed technique.
本文介绍了面积高效栅格码调制编解码器的设计技术。卷积编码是最好的编码技术之一,因为卷积编码改善了通信信道的误差性能。网格编码调制(TCM)在不需要带宽扩展的情况下可以获得较好的误码性能。维特比解码器用于栅格编码调制,用于解码由卷积编码器编码的数据。本文采用Xilinx ISE 13.2设计软件设计TCM编码器和解码器,设备使用Spartan 6。该技术旨在利用混合寄存器交换方法降低TCM译码器的硬件设计要求。混合寄存器交换方法(HREM)是寄存器交换方法(REM)和回溯技术(TB)的结合。与寄存器交换法(REM)和回溯法(TB)相比,HREM具有更大的优势,这两种方法对幸存者存储单元的设计面积要求更高。
{"title":"Design of Trellis code modulation decoder using Hybrid Register Exchange Method","authors":"T. Panse, Kshitij Saratkar","doi":"10.1109/ICCSP.2014.6949842","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949842","url":null,"abstract":"This paper presents the technique for designing the area efficient trellis code modulation encoder and decoder. One of the best encoding techniques is convolutional encoding as convolutional encoding improves the error performance of communicational channel. The trellis code modulation (TCM) can achieve the better error performance without Bandwidth expansion. Viterbi decoder is use in Trellis code modulation, to decode a data which is encoded by a convolutional encoder. Here TCM encoder and decoder are designed by using Xilinx ISE 13.2 design software and device use is Spartan 6. Proposed technique is aims to reduce the hardware requires for designing the TCM decoder by using hybrid register exchange method. Hybrid register exchange method (HREM) is a combination of the register exchange method (REM) and Traceback (TB) technique. HREM is superior as compared to Register Exchange Method (REM) and Traceback method (TB), where area requires for designing of survivor memory unit is more as compare to the proposed technique.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121675262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-03DOI: 10.1109/ICCSP.2014.6949861
K. Srinandhini, V. Vaithianathan
Orthogonal Frequency Division Multiplexing (OFDM) which is a FDM modulation is a promising methodology for high data rate applications like video streaming. This methodology works effectively for multipath frequency selective channels. Multiple Input and Multiple Output (MIMO) is a wireless technology that uses multiple antennas at the transceiver ends. It increases link throughput and network capacity. The combination of both MIMO and OFDM provides a system that is robust against the frequency-selective fading caused by sever multi-path scattering and narrowband interference. This ongoing evaluation has accelerated the development of System-on-chip (SoC) platform to support the physical layer of these technologies. In this paper, Field Programmable Gate Array (FPGA) implementation of channel coder, its decoder, interleaver and deinterleaver of MIMO-OFDM are discussed. Convolutional encoder of code rate 1/2 is used because of its less complexity and Viterbi decoder is used for decoding. Interleaver and Deinterleaver is used to remove the burst error thus improving the performance.
{"title":"FPGA implementation of MIMO-OFDM transceiver","authors":"K. Srinandhini, V. Vaithianathan","doi":"10.1109/ICCSP.2014.6949861","DOIUrl":"https://doi.org/10.1109/ICCSP.2014.6949861","url":null,"abstract":"Orthogonal Frequency Division Multiplexing (OFDM) which is a FDM modulation is a promising methodology for high data rate applications like video streaming. This methodology works effectively for multipath frequency selective channels. Multiple Input and Multiple Output (MIMO) is a wireless technology that uses multiple antennas at the transceiver ends. It increases link throughput and network capacity. The combination of both MIMO and OFDM provides a system that is robust against the frequency-selective fading caused by sever multi-path scattering and narrowband interference. This ongoing evaluation has accelerated the development of System-on-chip (SoC) platform to support the physical layer of these technologies. In this paper, Field Programmable Gate Array (FPGA) implementation of channel coder, its decoder, interleaver and deinterleaver of MIMO-OFDM are discussed. Convolutional encoder of code rate 1/2 is used because of its less complexity and Viterbi decoder is used for decoding. Interleaver and Deinterleaver is used to remove the burst error thus improving the performance.","PeriodicalId":149965,"journal":{"name":"2014 International Conference on Communication and Signal Processing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116206770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}