Pub Date : 2013-06-13DOI: 10.1109/ICE-CCN.2013.6528613
B. A. Priyadharssini, S. Sivagami, K. Muneeswaran
To manage large amount of video data, an effective search mechanism is necessary. The keyword based search system is not efficient for video data due to the lack of metadata; hence for video indexing a method called Maximum-a-posteriori (MAP) method which uses Expectation Maximization algorithm to form a universal background model (UBM) by applying all training data. MAP adaptation uses a prior knowledge of UBM model parameters to estimate parameters of every training and test data. GMM Supervectors can be generated from the adaptive mean vectors. Support Vector Machine (SVM) along with GMM supervectors is used for the classification of video. Experimental evaluation of the proposed method is done in TRECVID 2010 video dataset and the result shows that it is better, since the method uses the fusion of visual and audio features.
{"title":"Maximum a posteriori adaptation method for video semantic indexing","authors":"B. A. Priyadharssini, S. Sivagami, K. Muneeswaran","doi":"10.1109/ICE-CCN.2013.6528613","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528613","url":null,"abstract":"To manage large amount of video data, an effective search mechanism is necessary. The keyword based search system is not efficient for video data due to the lack of metadata; hence for video indexing a method called Maximum-a-posteriori (MAP) method which uses Expectation Maximization algorithm to form a universal background model (UBM) by applying all training data. MAP adaptation uses a prior knowledge of UBM model parameters to estimate parameters of every training and test data. GMM Supervectors can be generated from the adaptive mean vectors. Support Vector Machine (SVM) along with GMM supervectors is used for the classification of video. Experimental evaluation of the proposed method is done in TRECVID 2010 video dataset and the result shows that it is better, since the method uses the fusion of visual and audio features.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128559741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-06-13DOI: 10.1109/ICE-CCN.2013.6528565
D. Rajderkar, P. Mohod
Snowfall removal from an image is a challenging problem. In this paper, we propose a snowfall removal framework via image decomposition based on Morphological component analysis. The proposed methods first decompose an image into low frequency (LF) and high frequency (HF) parts using bilateral filter. The high frequency part is then decomposing into “snow component” and “non snow component” by performing dictionary learning and sparse coding.
{"title":"Removing snow from an image via image decomposition","authors":"D. Rajderkar, P. Mohod","doi":"10.1109/ICE-CCN.2013.6528565","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528565","url":null,"abstract":"Snowfall removal from an image is a challenging problem. In this paper, we propose a snowfall removal framework via image decomposition based on Morphological component analysis. The proposed methods first decompose an image into low frequency (LF) and high frequency (HF) parts using bilateral filter. The high frequency part is then decomposing into “snow component” and “non snow component” by performing dictionary learning and sparse coding.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125243708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528525
Pushpa, G. Shobha
Telecom Social Network Analysis (TSNA) is an upcoming and interesting area of concern in telecom industries since it not only helps in exploring the information regarding the social network of subscribers but also helps the operators' to focus on their business analytics. TSNA is being used to give a solution to some of the telecom problems such as to improve churn prediction, overall customer satisfaction and retention. Since the structure of social networks provides the natural way to understand customers' relationships and the behavior of groups of highly connected customers. The typical work on social network analysis includes the construction of both multirelational telecom social networks and ego-networks of telecom customers for discovery of group of customers who share similar properties and classify the customers as churners and non-churners. This paper explores both sociocentric and egocentric methods for identifying key players who plays important roles in decision making in finding the churn rate of telecom social networks.
{"title":"Sociocentric and egocentric measures for identifying the key players in telecom social network","authors":"Pushpa, G. Shobha","doi":"10.1109/ICE-CCN.2013.6528525","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528525","url":null,"abstract":"Telecom Social Network Analysis (TSNA) is an upcoming and interesting area of concern in telecom industries since it not only helps in exploring the information regarding the social network of subscribers but also helps the operators' to focus on their business analytics. TSNA is being used to give a solution to some of the telecom problems such as to improve churn prediction, overall customer satisfaction and retention. Since the structure of social networks provides the natural way to understand customers' relationships and the behavior of groups of highly connected customers. The typical work on social network analysis includes the construction of both multirelational telecom social networks and ego-networks of telecom customers for discovery of group of customers who share similar properties and classify the customers as churners and non-churners. This paper explores both sociocentric and egocentric methods for identifying key players who plays important roles in decision making in finding the churn rate of telecom social networks.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127117110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528534
S. Mukhopadhyay, P. K. Panigrahi, A. Mitra, P. Bhattacharya, M. Sarkar, P. Das
ARMA-Neural model is an established useful model for the Wind Power forecasting purpose. In the current work we introduced Discrete Hilbert Transform (DHT)-Neural Model which provides better result than the ARMA-Neural Model. We know that a signal and its' DHT produces the same Energy Spectrum. Based on this concept in this paper DHT is used for Wind Speed forecasting purpose. Thereafter the RBF neural network is used on this to forecast wind power. Taking the data of measured wind speed from Weather Forecasting Bureau Report as example, we validate the method described above.
arma -神经网络模型是一种成熟的风力发电预测模型。本文介绍了离散希尔伯特变换(DHT)-神经模型,该模型比arma -神经模型具有更好的结果。我们知道一个信号和它的DHT产生相同的能谱。基于这一概念,本文将DHT用于风速预报。在此基础上,利用RBF神经网络对风电进行预测。以气象局报告中的实测风速数据为例,对上述方法进行了验证。
{"title":"Optimized DHT-RBF model as replacement of ARMA-RBF model for wind power forecasting","authors":"S. Mukhopadhyay, P. K. Panigrahi, A. Mitra, P. Bhattacharya, M. Sarkar, P. Das","doi":"10.1109/ICE-CCN.2013.6528534","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528534","url":null,"abstract":"ARMA-Neural model is an established useful model for the Wind Power forecasting purpose. In the current work we introduced Discrete Hilbert Transform (DHT)-Neural Model which provides better result than the ARMA-Neural Model. We know that a signal and its' DHT produces the same Energy Spectrum. Based on this concept in this paper DHT is used for Wind Speed forecasting purpose. Thereafter the RBF neural network is used on this to forecast wind power. Taking the data of measured wind speed from Weather Forecasting Bureau Report as example, we validate the method described above.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125398552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528607
B. Rao, K. Vaisakh
This paper presents a multi-objective adaptive Clonal selection algorithm (MOACSA) for solving optimal power flow (OPF) problem. OPF problem is formulated as a non-linear constrained multi-objective optimization problem in which different objectives and various constraints have been considered. Fast elitist non-dominated sorting and crowding distance techniques have been used to find and manage the Pareto optimal front. Finally, a fuzzy based mechanism has been used to select a best compromise solution from the Pareto set. The proposed MOACS algorithm has been tested on IEEE 30-bus test system with different objectives such as cost, loss and L-index. Simulation studies are carried out under both normal load and load uncertainty conditions for multi-objective optimal power flow problem with different cases. The results obtained with normal load condition are also compared with fast non-dominated sorting genetic algorithm (NSGA-II), multi-objective harmony search algorithm (MOHS) and multi-objective differential evolutionary algorithm (MODE) methods which are available in the literature.
{"title":"Application of ACSA for solving multi-objective optimal power flow problem with load uncertainty","authors":"B. Rao, K. Vaisakh","doi":"10.1109/ICE-CCN.2013.6528607","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528607","url":null,"abstract":"This paper presents a multi-objective adaptive Clonal selection algorithm (MOACSA) for solving optimal power flow (OPF) problem. OPF problem is formulated as a non-linear constrained multi-objective optimization problem in which different objectives and various constraints have been considered. Fast elitist non-dominated sorting and crowding distance techniques have been used to find and manage the Pareto optimal front. Finally, a fuzzy based mechanism has been used to select a best compromise solution from the Pareto set. The proposed MOACS algorithm has been tested on IEEE 30-bus test system with different objectives such as cost, loss and L-index. Simulation studies are carried out under both normal load and load uncertainty conditions for multi-objective optimal power flow problem with different cases. The results obtained with normal load condition are also compared with fast non-dominated sorting genetic algorithm (NSGA-II), multi-objective harmony search algorithm (MOHS) and multi-objective differential evolutionary algorithm (MODE) methods which are available in the literature.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122681645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528468
C. Prakash, P. Rohini, R. Ganesh, V. Maheswari
In this paper, a service-oriented reliability model that calculates the reliability of composite web services is designed. This model is based on the real-time reliabilities of the atomic web services of the composition. This manuscript contradicts the fact that the reliability of system is based on the exponential function of error arrival rate. The Reliability rate of composite web services is inversely proportional to the workload of the servers. After obtaining the server workload, we dispatch the services into Idle and Active State using doubly stochastic model. This model assumes a Single Composite Service and the atomicity of the services are dispatched in both serial and parallel configurations. A Broker Architecture based on Bounded set technique is designed to deduce the error in the active state by calculating accessibility, availability and error rate. These factors are represented in terms of MTTE, MTBF, MEAR which in turn used to dispatch the services into the server which provides high reliability.
{"title":"Hybrid reliability model to enhance the efficiency of composite web services","authors":"C. Prakash, P. Rohini, R. Ganesh, V. Maheswari","doi":"10.1109/ICE-CCN.2013.6528468","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528468","url":null,"abstract":"In this paper, a service-oriented reliability model that calculates the reliability of composite web services is designed. This model is based on the real-time reliabilities of the atomic web services of the composition. This manuscript contradicts the fact that the reliability of system is based on the exponential function of error arrival rate. The Reliability rate of composite web services is inversely proportional to the workload of the servers. After obtaining the server workload, we dispatch the services into Idle and Active State using doubly stochastic model. This model assumes a Single Composite Service and the atomicity of the services are dispatched in both serial and parallel configurations. A Broker Architecture based on Bounded set technique is designed to deduce the error in the active state by calculating accessibility, availability and error rate. These factors are represented in terms of MTTE, MTBF, MEAR which in turn used to dispatch the services into the server which provides high reliability.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114543408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528558
A. Jain, A. Ghosh, S. Sarkar
In order to improve density of integration in VLSI chips and to ensure ultra low power dissipation Co-design of MOS transistor along with Single electron transistor is considered as one of the best option to work with. In the present work we have designed universal logic gates using hybrid SET-MOS based pass transistor logic. The logic gates are consists of one Single electron transistor and one NMOS transistor, both are working as pass transistors. In this paper we have designed NAND and NOR logic gates by providing inputs in their original and complemented form to the different nodes of the pass transistors depending upon the realization of that particular logic gate.
{"title":"Design and simulation of hybrid SET-MOS pass transistor logic based universal logic gates","authors":"A. Jain, A. Ghosh, S. Sarkar","doi":"10.1109/ICE-CCN.2013.6528558","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528558","url":null,"abstract":"In order to improve density of integration in VLSI chips and to ensure ultra low power dissipation Co-design of MOS transistor along with Single electron transistor is considered as one of the best option to work with. In the present work we have designed universal logic gates using hybrid SET-MOS based pass transistor logic. The logic gates are consists of one Single electron transistor and one NMOS transistor, both are working as pass transistors. In this paper we have designed NAND and NOR logic gates by providing inputs in their original and complemented form to the different nodes of the pass transistors depending upon the realization of that particular logic gate.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"83 1 Pt 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121923966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528512
S. Sharma, M. Wazid, N. Gupta, D. P. Singh, R. Goudar
In Wireless Sensor Networks (WSNs) there has been an extensive research going on to extend the life time of the network. Energy efficiency is one of the major concern in WSN's that impacts the network lifetime. There is a compulsive need to find out new and improved ways to reduce the energy consumption associated with different aspects in WSN due to the fact that energy is a critical and important resource in the design of WSN. In this paper, we focus on an important distribution aspect of WSN, task allocation with energy efficiency that helps in improving the utility of the network. Most previous sensor network lifetime enhancement techniques focused on balancing power distribution, based on assumption of uniform battery capacity allocation among homogenous nodes. This work aims to provide solution to the task assignment problem in heterogeneous WSN that also incorporates the log for data recovery in the event of failure. It has been calculated that the proposed method increases the throughput by 9.14%.
{"title":"Data recovery with energy efficient task allocation in Wireless Sensor Networks","authors":"S. Sharma, M. Wazid, N. Gupta, D. P. Singh, R. Goudar","doi":"10.1109/ICE-CCN.2013.6528512","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528512","url":null,"abstract":"In Wireless Sensor Networks (WSNs) there has been an extensive research going on to extend the life time of the network. Energy efficiency is one of the major concern in WSN's that impacts the network lifetime. There is a compulsive need to find out new and improved ways to reduce the energy consumption associated with different aspects in WSN due to the fact that energy is a critical and important resource in the design of WSN. In this paper, we focus on an important distribution aspect of WSN, task allocation with energy efficiency that helps in improving the utility of the network. Most previous sensor network lifetime enhancement techniques focused on balancing power distribution, based on assumption of uniform battery capacity allocation among homogenous nodes. This work aims to provide solution to the task assignment problem in heterogeneous WSN that also incorporates the log for data recovery in the event of failure. It has been calculated that the proposed method increases the throughput by 9.14%.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129663078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528568
S. Mahalakshmi, Dr. K. Vijayalakshmi, E. Agnes
An Extensive growth in software technologies available on Internet results in tampering of images. The main problem in the real world is to determine whether an image is real or forged. In this paper we propose a new method that makes use of the codebook which is generated from the set of image features to determine the geometric manipulations that are occurred in the received image. In the proposed method, an image hash based on bag of visual words attached as signature to the image before transmission. At the destination the forensic hash is compared to detect the geometric manipulations that are applied to the received image. The spatial distribution of image features is encoded to deal with highly textured and contrasted tampering patterns. The proposed method detects all types of tampering.
{"title":"A forensic method for detecting image forgery","authors":"S. Mahalakshmi, Dr. K. Vijayalakshmi, E. Agnes","doi":"10.1109/ICE-CCN.2013.6528568","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528568","url":null,"abstract":"An Extensive growth in software technologies available on Internet results in tampering of images. The main problem in the real world is to determine whether an image is real or forged. In this paper we propose a new method that makes use of the codebook which is generated from the set of image features to determine the geometric manipulations that are occurred in the received image. In the proposed method, an image hash based on bag of visual words attached as signature to the image before transmission. At the destination the forensic hash is compared to detect the geometric manipulations that are applied to the received image. The spatial distribution of image features is encoded to deal with highly textured and contrasted tampering patterns. The proposed method detects all types of tampering.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134188986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-03-25DOI: 10.1109/ICE-CCN.2013.6528548
K. Sundaravadivu, S. Bharathi
We propose and analyze a generalized spatial modulation scheme. In this GSM multiple antenna will be active during the transmission. A spatial modulation (SM) scheme with multiple active transmit antennas, named as multiple active spatial modulation (MA-SM). In MIMO multiple transmitting antennas are allowed in the SM system to transmit different symbols at the same time instant. Here the Space Time Block Codes are used instead of Spatial Modulator. Compare to SM in STBC the bit error probability is good and signals to noise ratio will be increased. When we will increase the number of transmit and receive antennas using spatial modulator to encode the transmitted datas the bit error rate is high and signal to noise ratio is good for 2×2 MIMO. For 4×4 MIMO the bit error rate is reduced and signal to noise ratio is poor. So to get a Good BER Vs SNR and FER Vs SNR the STBC is used instead of spatial modulator. And for better result the inter symbol distance will be increased in the data transmission and for each symbol the rotation angle will be applied. In GSM 16-QAM modulation is used. So here BPSK, QPSK, 16-QAM modulator and 8 PSK are compared. When Compare to all modulation techniques BPSK modulation is better for good BER Vs SNR and FER Vs SNR.
{"title":"STBC codes for generalized spatial modulation in MIMO systems","authors":"K. Sundaravadivu, S. Bharathi","doi":"10.1109/ICE-CCN.2013.6528548","DOIUrl":"https://doi.org/10.1109/ICE-CCN.2013.6528548","url":null,"abstract":"We propose and analyze a generalized spatial modulation scheme. In this GSM multiple antenna will be active during the transmission. A spatial modulation (SM) scheme with multiple active transmit antennas, named as multiple active spatial modulation (MA-SM). In MIMO multiple transmitting antennas are allowed in the SM system to transmit different symbols at the same time instant. Here the Space Time Block Codes are used instead of Spatial Modulator. Compare to SM in STBC the bit error probability is good and signals to noise ratio will be increased. When we will increase the number of transmit and receive antennas using spatial modulator to encode the transmitted datas the bit error rate is high and signal to noise ratio is good for 2×2 MIMO. For 4×4 MIMO the bit error rate is reduced and signal to noise ratio is poor. So to get a Good BER Vs SNR and FER Vs SNR the STBC is used instead of spatial modulator. And for better result the inter symbol distance will be increased in the data transmission and for each symbol the rotation angle will be applied. In GSM 16-QAM modulation is used. So here BPSK, QPSK, 16-QAM modulator and 8 PSK are compared. When Compare to all modulation techniques BPSK modulation is better for good BER Vs SNR and FER Vs SNR.","PeriodicalId":286830,"journal":{"name":"2013 IEEE International Conference ON Emerging Trends in Computing, Communication and Nanotechnology (ICECCN)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131867338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}