Pub Date : 2014-04-14DOI: 10.1109/TENCONSPRING.2014.6863048
N. Shairi, Badrul Hisham Ahmad, P. Wong
An absorptive Single Pole Double Throw (SPDT) switch using cascaded switchable parallel-coupled stub resonator and switchable radial stub resonator is proposed in this paper. By using mathematical model, theories of the switchable resonators are discussed. The switchable resonators are reconfigured between bandstop and allpass response in the absorptive SPDT switch design. The allpass response is operated in wide bandwidth centered at resonant frequency. Frequency spectrum in 3.5 GHz band has been chosen to demonstrate the design where the targeted application is Time Division Duplex (TDD) switching in wideband wireless data communication systems. The proposed absorptive SPDT switch is simulated in an electronic design automation software for analysis in terms of insertion loss, return loss and isolation. Result in simulation shows less than 2 dB of insertion loss, more than 14 dB of return loss at absorptive ports and more than 39 dB of isolation from 3.4 to 3.6 GHz.
{"title":"Absorptive SPDT switch design using cascaded switchable parallel-coupled stub resonator and switchable radial stub resonator","authors":"N. Shairi, Badrul Hisham Ahmad, P. Wong","doi":"10.1109/TENCONSPRING.2014.6863048","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863048","url":null,"abstract":"An absorptive Single Pole Double Throw (SPDT) switch using cascaded switchable parallel-coupled stub resonator and switchable radial stub resonator is proposed in this paper. By using mathematical model, theories of the switchable resonators are discussed. The switchable resonators are reconfigured between bandstop and allpass response in the absorptive SPDT switch design. The allpass response is operated in wide bandwidth centered at resonant frequency. Frequency spectrum in 3.5 GHz band has been chosen to demonstrate the design where the targeted application is Time Division Duplex (TDD) switching in wideband wireless data communication systems. The proposed absorptive SPDT switch is simulated in an electronic design automation software for analysis in terms of insertion loss, return loss and isolation. Result in simulation shows less than 2 dB of insertion loss, more than 14 dB of return loss at absorptive ports and more than 39 dB of isolation from 3.4 to 3.6 GHz.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114664809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-14DOI: 10.1109/TENCONSPRING.2014.6863044
H. Peng, Hsien Shiung Hwang, M. Devarajan
The optical performance of high-power multichip Chip-on-Board (COB) white light-emitting diodes (WLEDs) with different phosphor layer thicknesses ranging from 1.5mm to 3.5mm were investigated in this paper. This investigation reports that the optical performance in terms of phosphor conversion efficiency, Correlated Color Temperature (CCT) and Color Rendering Index (CRI) readings of WLEDs are significantly dependent on the phosphor layer thickness (or phosphor-dispersed epoxy weight). WLED packages with thicker phosphor layer have lesser phosphor conversion efficiency, and functions with an excessive yellow-to-blue ratio that shifts white light output to a yellowish color, lowering both CCT and CRI values.
{"title":"Phosphor thickness effects on the optical performance of high power phosphor converted chip-on-board light-emitting diodes","authors":"H. Peng, Hsien Shiung Hwang, M. Devarajan","doi":"10.1109/TENCONSPRING.2014.6863044","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863044","url":null,"abstract":"The optical performance of high-power multichip Chip-on-Board (COB) white light-emitting diodes (WLEDs) with different phosphor layer thicknesses ranging from 1.5mm to 3.5mm were investigated in this paper. This investigation reports that the optical performance in terms of phosphor conversion efficiency, Correlated Color Temperature (CCT) and Color Rendering Index (CRI) readings of WLEDs are significantly dependent on the phosphor layer thickness (or phosphor-dispersed epoxy weight). WLED packages with thicker phosphor layer have lesser phosphor conversion efficiency, and functions with an excessive yellow-to-blue ratio that shifts white light output to a yellowish color, lowering both CCT and CRI values.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115037206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-14DOI: 10.1109/TENCONSPRING.2014.6863107
B. Siva Kumar Reddy, Lakshmi Boppana, Ashok Agarwal
An OFDM based WiMAX physical layer combining with Continuously Variable Slope Delta (CVSD) speech coding strategy has been implemented utilizing GNU Radio and USRP N210. CVSD vocoder is a non linear sampled data feedback framework which recognizes a band limited analog signal and converts it into binary form for transmission through a digital channel. The binary signal is decoded into a nearby estimate of original analog signal at the receiver. We executed a complete transceiver chain using testbed for WiMAX specifications. Further, we measure the performance of the testbed by evaluating error rate performance. The CVSD coding system is implemented in GNU Radio and the test outcomes demonstrated that coding has better Bit Error Rate (BER) and Symbol Error Rate (SER) values when integrated with FEC (Forward Error Correction). FEC has been carried out by linking convolutional coder (CCSDS coder) and Reed Muller (RM) coders.
{"title":"BER analysis of CVSD vocoder for WiMAX using GNU Radio","authors":"B. Siva Kumar Reddy, Lakshmi Boppana, Ashok Agarwal","doi":"10.1109/TENCONSPRING.2014.6863107","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863107","url":null,"abstract":"An OFDM based WiMAX physical layer combining with Continuously Variable Slope Delta (CVSD) speech coding strategy has been implemented utilizing GNU Radio and USRP N210. CVSD vocoder is a non linear sampled data feedback framework which recognizes a band limited analog signal and converts it into binary form for transmission through a digital channel. The binary signal is decoded into a nearby estimate of original analog signal at the receiver. We executed a complete transceiver chain using testbed for WiMAX specifications. Further, we measure the performance of the testbed by evaluating error rate performance. The CVSD coding system is implemented in GNU Radio and the test outcomes demonstrated that coding has better Bit Error Rate (BER) and Symbol Error Rate (SER) values when integrated with FEC (Forward Error Correction). FEC has been carried out by linking convolutional coder (CCSDS coder) and Reed Muller (RM) coders.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115043677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-14DOI: 10.1109/TENCONSPRING.2014.6863080
M. Nematollahi, S. Al-Haddad, S. Doraisamy, M. Ranjbari
This paper presents new method for improving the security of speaker recognition in case of spoofing attack. In the proposed technique, digital speech watermarking has been applied on speech signal to increase robustness. To achieve this purpose, watermark is embedded in claimed signal at transmission side and then it is sent through the unsecure channel. In receiver side, watermark is extracted as proof of authentication. The results shows that digital speech watermarking can successfully apply for anti-spoofing attack purposes because the quality of the speech signal is not significantly degraded by watermark.
{"title":"Digital speech watermarking for anti-spoofing attack in speaker recognition","authors":"M. Nematollahi, S. Al-Haddad, S. Doraisamy, M. Ranjbari","doi":"10.1109/TENCONSPRING.2014.6863080","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863080","url":null,"abstract":"This paper presents new method for improving the security of speaker recognition in case of spoofing attack. In the proposed technique, digital speech watermarking has been applied on speech signal to increase robustness. To achieve this purpose, watermark is embedded in claimed signal at transmission side and then it is sent through the unsecure channel. In receiver side, watermark is extracted as proof of authentication. The results shows that digital speech watermarking can successfully apply for anti-spoofing attack purposes because the quality of the speech signal is not significantly degraded by watermark.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"246 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133615022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-14DOI: 10.1109/TENCONSPRING.2014.6863016
Joel Chia Ming Than, N. Noor, O. M. Rijal, A. Yunus, Rosminah Md Kassim
This study's objective is to execute successful segmentation of the lung anatomy of HRCT of patients who have ILD and evaluate the segmentation performance. Initial segmentation process involved Otsu grey level thresholding and morphological filtering. Some of the problems encountered were the appearance of connected lungs because the left lung and right lung were very close to each other, and heavily diseased lungs with too much damaged tissue. By using Radon transform and accumulating the pixel width, a separation region could be found to split left lung and right lung. The separation process yielded 70.1% improvement for all the samples with connected lungs. This causes the segmentation results for Level 1 to increase to 79.01% for Right Lung and 92.59% for Left Lung, for level 2, successful segmentation increased to 88.89% for both lungs. In Level 3 segmentation results increased to 85.19% for Right Lung and 82.72% for Left Lung. For Level 4 segmentation results increased to 96.30% for Right Lung and 95.06% for Left Lung. For Level 5 segmentation results increased to 92.59% for Right Lung and 86.42% for Left Lung. Samples that could not be separated were due to the size of the splitting region which could be tackled with an adaptive splitting region in future works.
{"title":"Lung segmentation for HRCT thorax images using radon transform and accumulating pixel width","authors":"Joel Chia Ming Than, N. Noor, O. M. Rijal, A. Yunus, Rosminah Md Kassim","doi":"10.1109/TENCONSPRING.2014.6863016","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863016","url":null,"abstract":"This study's objective is to execute successful segmentation of the lung anatomy of HRCT of patients who have ILD and evaluate the segmentation performance. Initial segmentation process involved Otsu grey level thresholding and morphological filtering. Some of the problems encountered were the appearance of connected lungs because the left lung and right lung were very close to each other, and heavily diseased lungs with too much damaged tissue. By using Radon transform and accumulating the pixel width, a separation region could be found to split left lung and right lung. The separation process yielded 70.1% improvement for all the samples with connected lungs. This causes the segmentation results for Level 1 to increase to 79.01% for Right Lung and 92.59% for Left Lung, for level 2, successful segmentation increased to 88.89% for both lungs. In Level 3 segmentation results increased to 85.19% for Right Lung and 82.72% for Left Lung. For Level 4 segmentation results increased to 96.30% for Right Lung and 95.06% for Left Lung. For Level 5 segmentation results increased to 92.59% for Right Lung and 86.42% for Left Lung. Samples that could not be separated were due to the size of the splitting region which could be tackled with an adaptive splitting region in future works.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133192668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-14DOI: 10.1109/TENCONSPRING.2014.6863035
M. Awais, N. Badruddin, M. Drieberg
Driver drowsiness is considered to be a very critical issue causing many fatal accidents, injuries and property damages. Therefore, it has been an area of intensive research in recent years. In this paper, a driving simulator based study was conducted to observe the significant changes that occur in the EEG power spectrum during monotonous driving. Nine healthy university students voluntarily participated in the experiment. The absolute band power of the EEG signal was computed by taking the FFT of the time series signal and then the power spectral density was computed using Welch method. Our findings conclude that alpha and theta band powers increase significantly (p<;0.05) when a subject moves from alert state to drowsy state. These changes are more dominant in the occipital and parietal regions when compared to the other regions. The findings of this study provide a promising drowsiness indicator which can be used to prevent road accidents caused by driver drowsiness.
{"title":"Driver drowsiness detection using EEG power spectrum analysis","authors":"M. Awais, N. Badruddin, M. Drieberg","doi":"10.1109/TENCONSPRING.2014.6863035","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863035","url":null,"abstract":"Driver drowsiness is considered to be a very critical issue causing many fatal accidents, injuries and property damages. Therefore, it has been an area of intensive research in recent years. In this paper, a driving simulator based study was conducted to observe the significant changes that occur in the EEG power spectrum during monotonous driving. Nine healthy university students voluntarily participated in the experiment. The absolute band power of the EEG signal was computed by taking the FFT of the time series signal and then the power spectral density was computed using Welch method. Our findings conclude that alpha and theta band powers increase significantly (p<;0.05) when a subject moves from alert state to drowsy state. These changes are more dominant in the occipital and parietal regions when compared to the other regions. The findings of this study provide a promising drowsiness indicator which can be used to prevent road accidents caused by driver drowsiness.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133458640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-14DOI: 10.1109/TENCONSPRING.2014.6863011
R. Kodali
Wireless Sensor Networks (WSNs), comprising of tiny nodes with limited energy, computational and communication resources, are being widely used in various application areas ranging from pollution and weather monitoring to military. Even though every application may not require data to be exchanged in a secure manner, few WSN applications may have certain security requirements. The data is encrypted by a sender and sent over the wireless links and the same is decrypted at the receiver. To meet this purpose, symmetric key cryptographic (SKC) algorithms may be used. Such SKC primitives require keys to be made available before carrying out the data transfer between the nodes. Alternately, Public Key Cryptographic techniques, such as RSA algorithm can be considered. Even though, RSA is a popular algorithm providing good security level, it is computationally intensive involving large key sizes. The RSA can not be used in WSNs, as the nodes have limited resources. Presently, it is infeasible to implement the RSA algorithm using any of the WSN nodes commercially available. Elliptic curve cryptography (ECC), another public key cryptographic (PKC) algorithm providing same level of security with smaller key size requirements, can be used as an alternative in order to provide security in WSN applications. ECC encryption and decryption use domain parameters, which includes the Generator point to be published. In most of the outdoor WSN applications, the deployment of the nodes is random and the nodes could be captured and an attacker could launch man-in-middle (MIM) attack, and break the public key thereby leading to security breach in the network. A technique to overcome such an attack is proposed in this work and the same is compared with two other similar approaches.
{"title":"ECC with hidden generator point in WSNs","authors":"R. Kodali","doi":"10.1109/TENCONSPRING.2014.6863011","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863011","url":null,"abstract":"Wireless Sensor Networks (WSNs), comprising of tiny nodes with limited energy, computational and communication resources, are being widely used in various application areas ranging from pollution and weather monitoring to military. Even though every application may not require data to be exchanged in a secure manner, few WSN applications may have certain security requirements. The data is encrypted by a sender and sent over the wireless links and the same is decrypted at the receiver. To meet this purpose, symmetric key cryptographic (SKC) algorithms may be used. Such SKC primitives require keys to be made available before carrying out the data transfer between the nodes. Alternately, Public Key Cryptographic techniques, such as RSA algorithm can be considered. Even though, RSA is a popular algorithm providing good security level, it is computationally intensive involving large key sizes. The RSA can not be used in WSNs, as the nodes have limited resources. Presently, it is infeasible to implement the RSA algorithm using any of the WSN nodes commercially available. Elliptic curve cryptography (ECC), another public key cryptographic (PKC) algorithm providing same level of security with smaller key size requirements, can be used as an alternative in order to provide security in WSN applications. ECC encryption and decryption use domain parameters, which includes the Generator point to be published. In most of the outdoor WSN applications, the deployment of the nodes is random and the nodes could be captured and an attacker could launch man-in-middle (MIM) attack, and break the public key thereby leading to security breach in the network. A technique to overcome such an attack is proposed in this work and the same is compared with two other similar approaches.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116581202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-14DOI: 10.1109/TENCONSPRING.2014.6863111
Muhammad Imran Ahmad, M. Z. Ilyas, Mohd Nazrin Md Isa, R. Ngadiran, A. M. Darsono
The information fusion of face and palmprint biometrics using local features is investigated at feature level. The proposed method uses local information extracted from local region of biometric image which has rich statistical information. The texture of each region is processed using multiresolution analysis with different orientations and scales. The feature dimensionality of each region is reduced to produce a compact and high discriminative feature vector used for concatenation process. Feature fusion of the extracted features is able to increase the discrimination power in the feature space. The use of principle component analysis (PCA) and linear discriminant analysis (LDA) methods significantly reduce dimension of the feature vector by removing redundant and noise data while increasing the discriminant power in the fused feature space. Results of both identification and verification rates show significant improvement compared to that achieved by single modal biometrics and several existing multimodal methods.
{"title":"Information fusion of face and palmprint multimodal biometrics","authors":"Muhammad Imran Ahmad, M. Z. Ilyas, Mohd Nazrin Md Isa, R. Ngadiran, A. M. Darsono","doi":"10.1109/TENCONSPRING.2014.6863111","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863111","url":null,"abstract":"The information fusion of face and palmprint biometrics using local features is investigated at feature level. The proposed method uses local information extracted from local region of biometric image which has rich statistical information. The texture of each region is processed using multiresolution analysis with different orientations and scales. The feature dimensionality of each region is reduced to produce a compact and high discriminative feature vector used for concatenation process. Feature fusion of the extracted features is able to increase the discrimination power in the feature space. The use of principle component analysis (PCA) and linear discriminant analysis (LDA) methods significantly reduce dimension of the feature vector by removing redundant and noise data while increasing the discriminant power in the fused feature space. Results of both identification and verification rates show significant improvement compared to that achieved by single modal biometrics and several existing multimodal methods.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122325598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-14DOI: 10.1109/TENCONSPRING.2014.6863046
N. Radzi, N. M. Din, S. Sadon, M. Al-Mansoori
Ethernet Passive Optical Network (EPON) is one of the most promising technologies for FTTX deployed by service providers at the access network. Dynamic Bandwidth Allocation (DBA) for the upstream traffic can help optimize the network bandwidth utilization. This paper discusses a centralized DBA called as Universal DBA (UDBA) algorithm that supports quality of service (QoS) of the upstream traffic. UDBA algorithm is compared with other DBA algorithm to prove its advantages. It shows that UDBA algorithm improves upon expedited forwarding, assured forwarding and best effort delay on average 62.2%, 36.3%, and 23.1% respectively. The fairness index of UDBA algorithm is improved as high as 5.4%.
{"title":"The delay and fairness study of a centralised EPON DBA algorithm","authors":"N. Radzi, N. M. Din, S. Sadon, M. Al-Mansoori","doi":"10.1109/TENCONSPRING.2014.6863046","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863046","url":null,"abstract":"Ethernet Passive Optical Network (EPON) is one of the most promising technologies for FTTX deployed by service providers at the access network. Dynamic Bandwidth Allocation (DBA) for the upstream traffic can help optimize the network bandwidth utilization. This paper discusses a centralized DBA called as Universal DBA (UDBA) algorithm that supports quality of service (QoS) of the upstream traffic. UDBA algorithm is compared with other DBA algorithm to prove its advantages. It shows that UDBA algorithm improves upon expedited forwarding, assured forwarding and best effort delay on average 62.2%, 36.3%, and 23.1% respectively. The fairness index of UDBA algorithm is improved as high as 5.4%.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124981855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-04-14DOI: 10.1109/TENCONSPRING.2014.6863021
Majid Moghaddasi, S. Seyedzadeh, Siti Barirah Ahmad Anas
Performance of three different Optical Code Division Multiple Access codes namely Prime Code (PC), Quadratic Congruence (QC), and Khazani-Syed (KS) code are compared in Free Space Optic (FSO) and optical fiber transmission. The simulation results show that efficiency of a code family is medium-dependent. While one code family performs the best in fiber medium, it is not necessary that it acts the same in FSO. For instance, KS with code weight of 6 provides BER 10-12 at 600 m distance, while other codes cannot even reach to the threshold 10-9 at this point. However this code shows vulnerability against fiber dispersion. At 5 km fiber, it provides BER of 10-7, even less then PC with 10-8. In that point KS code with weight 6 attains the best performance with BER of 10-11.
{"title":"Optical Code Division Multiple Access Codes comparison in free space optics and optical fiber transmission medium","authors":"Majid Moghaddasi, S. Seyedzadeh, Siti Barirah Ahmad Anas","doi":"10.1109/TENCONSPRING.2014.6863021","DOIUrl":"https://doi.org/10.1109/TENCONSPRING.2014.6863021","url":null,"abstract":"Performance of three different Optical Code Division Multiple Access codes namely Prime Code (PC), Quadratic Congruence (QC), and Khazani-Syed (KS) code are compared in Free Space Optic (FSO) and optical fiber transmission. The simulation results show that efficiency of a code family is medium-dependent. While one code family performs the best in fiber medium, it is not necessary that it acts the same in FSO. For instance, KS with code weight of 6 provides BER 10-12 at 600 m distance, while other codes cannot even reach to the threshold 10-9 at this point. However this code shows vulnerability against fiber dispersion. At 5 km fiber, it provides BER of 10-7, even less then PC with 10-8. In that point KS code with weight 6 attains the best performance with BER of 10-11.","PeriodicalId":270495,"journal":{"name":"2014 IEEE REGION 10 SYMPOSIUM","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129246772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}