Pub Date : 2015-04-16DOI: 10.1109/NCC.2015.7084865
B. K. Khonglah, Rajib Sharma, S. Prasanna
This work explores the use of Empirical Mode Decomposition (EMD) for discriminating speech regions from music in audio recordings. The different frequency scales or Intrinsic Mode Functions (IMFs) obtained from EMD of the audio signal are found to contain discriminatory evidence for distinguishing the speech regions from the music regions of the audio signal. Different statistical measures like mean, absolute mean, variance, skewness and kurtosis are computed from the various IMFs and investigated for speech vs music discrimination. These features on being used for classification using classifiers like Support Vector Machines (SVMs) and k-Nearest Neighbour (k-NN) on the Scheirer and Slaney database gives the best overall classification accuracy of 90.83% for the SVMs and 85.33% for the k-NN.
{"title":"Speech vs music discrimination using Empirical Mode Decomposition","authors":"B. K. Khonglah, Rajib Sharma, S. Prasanna","doi":"10.1109/NCC.2015.7084865","DOIUrl":"https://doi.org/10.1109/NCC.2015.7084865","url":null,"abstract":"This work explores the use of Empirical Mode Decomposition (EMD) for discriminating speech regions from music in audio recordings. The different frequency scales or Intrinsic Mode Functions (IMFs) obtained from EMD of the audio signal are found to contain discriminatory evidence for distinguishing the speech regions from the music regions of the audio signal. Different statistical measures like mean, absolute mean, variance, skewness and kurtosis are computed from the various IMFs and investigated for speech vs music discrimination. These features on being used for classification using classifiers like Support Vector Machines (SVMs) and k-Nearest Neighbour (k-NN) on the Scheirer and Slaney database gives the best overall classification accuracy of 90.83% for the SVMs and 85.33% for the k-NN.","PeriodicalId":302718,"journal":{"name":"2015 Twenty First National Conference on Communications (NCC)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124894170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-04-16DOI: 10.1109/NCC.2015.7084911
Mahima Mehta, N. Akhtar, A. Karandikar
In this paper, we investigate issues related to the estimation of user's mobility state in the Long Term Evolution (LTE) heterogeneous cellular network. We discuss the need of such estimation and further, we propose an enhancement to the existing Mobility State Estimation (MSE) procedure which results in reduced HandOver failures. We also analyze the role of thresholds in mobility state estimation and their impact on the mobility performance. We analyze the performance using the Heterogeneous Network (HetNet) mobility simulator that we have developed as per the guidelines specified in the Release 12 of the Third Generation Partnership Project (3GPP) LTE standard.
{"title":"Enhanced Mobility State Estimation in LTE HetNets","authors":"Mahima Mehta, N. Akhtar, A. Karandikar","doi":"10.1109/NCC.2015.7084911","DOIUrl":"https://doi.org/10.1109/NCC.2015.7084911","url":null,"abstract":"In this paper, we investigate issues related to the estimation of user's mobility state in the Long Term Evolution (LTE) heterogeneous cellular network. We discuss the need of such estimation and further, we propose an enhancement to the existing Mobility State Estimation (MSE) procedure which results in reduced HandOver failures. We also analyze the role of thresholds in mobility state estimation and their impact on the mobility performance. We analyze the performance using the Heterogeneous Network (HetNet) mobility simulator that we have developed as per the guidelines specified in the Release 12 of the Third Generation Partnership Project (3GPP) LTE standard.","PeriodicalId":302718,"journal":{"name":"2015 Twenty First National Conference on Communications (NCC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131082614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-04-16DOI: 10.1109/NCC.2015.7084902
Anil K. Jacob, G. S. Kishore, L. Jacob
Lifetimes and latencies of devices in wireless body area networks (WBANs) that monitor the health conditions of patients largely determine their utility under such a setup. It is seen that the medium access control (MAC) used in the WBAN can play a significant role in the network lifetime and the quality of service (QoS) it can provide. IEEE 802.15.6 standard for WBAN includes different MAC options: contention, scheduled, polling, or a combination of these techniques. In this paper, contention based on CSMA/CA and polling are investigated to assess their effectiveness in meeting the lifetime and QoS requirements of WBAN with multipriority traffic. We provide analytical models for the access delay and lifetime with contention access, and also for latency with polling access. The analytical results are compared with simulation for a typical configuration of medical devices. It is found that priority polling can give a combination of high lifetime and a low latency. Various other results offer important insights into the behaviour of these techniques under WBAN conditions.
{"title":"Contention versus polling access in IEEE 802.15.6: Delay and lifetime analysis","authors":"Anil K. Jacob, G. S. Kishore, L. Jacob","doi":"10.1109/NCC.2015.7084902","DOIUrl":"https://doi.org/10.1109/NCC.2015.7084902","url":null,"abstract":"Lifetimes and latencies of devices in wireless body area networks (WBANs) that monitor the health conditions of patients largely determine their utility under such a setup. It is seen that the medium access control (MAC) used in the WBAN can play a significant role in the network lifetime and the quality of service (QoS) it can provide. IEEE 802.15.6 standard for WBAN includes different MAC options: contention, scheduled, polling, or a combination of these techniques. In this paper, contention based on CSMA/CA and polling are investigated to assess their effectiveness in meeting the lifetime and QoS requirements of WBAN with multipriority traffic. We provide analytical models for the access delay and lifetime with contention access, and also for latency with polling access. The analytical results are compared with simulation for a typical configuration of medical devices. It is found that priority polling can give a combination of high lifetime and a low latency. Various other results offer important insights into the behaviour of these techniques under WBAN conditions.","PeriodicalId":302718,"journal":{"name":"2015 Twenty First National Conference on Communications (NCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129864054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-04-16DOI: 10.1109/NCC.2015.7084886
N. Meenakshi, P. Ghosh
A whispered speech resembles an unvoiced speech due to the lack of vocal fold vibration unlike the neutral speech. Since information about the gender of a speaker typically lies in the pitch resulted from the vocal fold vibration (or source signal), identifying gender from the whispered speech is more challenging compared to that from the neutral speech. In the absence of the pitch, we study the use of the vocal tract filter captured through the spectral envelope for automatic gender classification (AGC) from a whispered speech. The spectral envelope is represented by the Mel frequency cepstral coefficients (MFCCs). We also compare the AGC performance from the neutral speech using only MFCCs with that from the whispered speech. AGC experiment using a set of 33 sentences spoken in neutral and whispered mode by 16 female and 20 male speakers reveals that the AGC accuracy using the neutral speech is, on average, higher (4.5% absolute) than that using the whispered speech when only the spectral shape information is used. This is true even when we use a subset of MFCCs obtained by a forward cepstral coefficient selection algorithm. However, the AGC accuracy obtained using the MFCC of the neutral speech is found to be 2.83% (absolute) lower compared to that using pitch. These findings not only suggest that there is gender specific information in the spectral shape but also indicate that the spectral shape carries less gender specific information when a speaker whispers as opposed to speaking normally.
{"title":"Automatic gender classification using the mel frequency cepstrum of neutral and whispered speech: A comparative study","authors":"N. Meenakshi, P. Ghosh","doi":"10.1109/NCC.2015.7084886","DOIUrl":"https://doi.org/10.1109/NCC.2015.7084886","url":null,"abstract":"A whispered speech resembles an unvoiced speech due to the lack of vocal fold vibration unlike the neutral speech. Since information about the gender of a speaker typically lies in the pitch resulted from the vocal fold vibration (or source signal), identifying gender from the whispered speech is more challenging compared to that from the neutral speech. In the absence of the pitch, we study the use of the vocal tract filter captured through the spectral envelope for automatic gender classification (AGC) from a whispered speech. The spectral envelope is represented by the Mel frequency cepstral coefficients (MFCCs). We also compare the AGC performance from the neutral speech using only MFCCs with that from the whispered speech. AGC experiment using a set of 33 sentences spoken in neutral and whispered mode by 16 female and 20 male speakers reveals that the AGC accuracy using the neutral speech is, on average, higher (4.5% absolute) than that using the whispered speech when only the spectral shape information is used. This is true even when we use a subset of MFCCs obtained by a forward cepstral coefficient selection algorithm. However, the AGC accuracy obtained using the MFCC of the neutral speech is found to be 2.83% (absolute) lower compared to that using pitch. These findings not only suggest that there is gender specific information in the spectral shape but also indicate that the spectral shape carries less gender specific information when a speaker whispers as opposed to speaking normally.","PeriodicalId":302718,"journal":{"name":"2015 Twenty First National Conference on Communications (NCC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130707651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-04-16DOI: 10.1109/NCC.2015.7084861
Himakshi Choudhury, S. Mandal, Sanjeevan Devnath, S. Prasanna, S. Sundaram
Hidden Markov Models (HMM) are the widely used modeling techniques for online handwriting recognition. This paper describes both stroke based and character based methods for Assamese handwritten character recognition using HMM classifier. In stroke based method, unique strokes that are used to write the characters are grouped and then HMM modeling is done for each of these selected class of strokes. A character can comprise of one or multiple strokes. Reference set is prepared by analyzing the different combinations of strokes and the degree of confusion between similar strokes. The stroke based method comprises of two stages. First, the stroke sequences in the test character is recognized by stroke based HMM classifier and in the second stage this sequence of strokes is compared against the entries of the reference set. The character corresponding to the matched stroke sequence in the reference set is considered as the recognized character. In character based method, each character as a whole is modeled using HMM and the classifier directly predicts the character class. Experiments were performed on 141 Assamese characters, collected from 100 native Assamese writers and it is observed that character based method gives better result than stroke based method.
{"title":"Comparison of assamese character recognizer using stroke level and character level engines","authors":"Himakshi Choudhury, S. Mandal, Sanjeevan Devnath, S. Prasanna, S. Sundaram","doi":"10.1109/NCC.2015.7084861","DOIUrl":"https://doi.org/10.1109/NCC.2015.7084861","url":null,"abstract":"Hidden Markov Models (HMM) are the widely used modeling techniques for online handwriting recognition. This paper describes both stroke based and character based methods for Assamese handwritten character recognition using HMM classifier. In stroke based method, unique strokes that are used to write the characters are grouped and then HMM modeling is done for each of these selected class of strokes. A character can comprise of one or multiple strokes. Reference set is prepared by analyzing the different combinations of strokes and the degree of confusion between similar strokes. The stroke based method comprises of two stages. First, the stroke sequences in the test character is recognized by stroke based HMM classifier and in the second stage this sequence of strokes is compared against the entries of the reference set. The character corresponding to the matched stroke sequence in the reference set is considered as the recognized character. In character based method, each character as a whole is modeled using HMM and the classifier directly predicts the character class. Experiments were performed on 141 Assamese characters, collected from 100 native Assamese writers and it is observed that character based method gives better result than stroke based method.","PeriodicalId":302718,"journal":{"name":"2015 Twenty First National Conference on Communications (NCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130050643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-04-16DOI: 10.1109/NCC.2015.7084925
V. Sukumaran, Jobin Wilson, P. Kapadia
We consider whether Barabási multiclass priority service queueing models are appropriate for modelling voice and short message service interusage and voice usage residual time distributions for a set of high usage subscribers of an Asian telecommunication service provider. We find that a model with a non priority service discipline rather than any priority discipline provides an alternative explanation for the fitted power-law for the interusage time distributions. We also find that a Barabási model provides an alternative explanation to the fitted power-law for the voice usage residual time distribution. However, the exponent of the fitted power-law has not been observed before. Therefore, we propose and analyse a new Barabási list-of-tasks priority model with time varying and discrete task priorities. For a special case we show that the waiting time distribution has a power-law with a previously unknown power-law decay exponent, which is different from the observed exponent for the voice usage residual time distribution.
{"title":"On power-law decay exponents and Barabasi models for subscriber usage behaviour in mobile networks","authors":"V. Sukumaran, Jobin Wilson, P. Kapadia","doi":"10.1109/NCC.2015.7084925","DOIUrl":"https://doi.org/10.1109/NCC.2015.7084925","url":null,"abstract":"We consider whether Barabási multiclass priority service queueing models are appropriate for modelling voice and short message service interusage and voice usage residual time distributions for a set of high usage subscribers of an Asian telecommunication service provider. We find that a model with a non priority service discipline rather than any priority discipline provides an alternative explanation for the fitted power-law for the interusage time distributions. We also find that a Barabási model provides an alternative explanation to the fitted power-law for the voice usage residual time distribution. However, the exponent of the fitted power-law has not been observed before. Therefore, we propose and analyse a new Barabási list-of-tasks priority model with time varying and discrete task priorities. For a special case we show that the waiting time distribution has a power-law with a previously unknown power-law decay exponent, which is different from the observed exponent for the voice usage residual time distribution.","PeriodicalId":302718,"journal":{"name":"2015 Twenty First National Conference on Communications (NCC)","volume":"265 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120972537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-04-16DOI: 10.1109/NCC.2015.7084862
Abhishek Chakraborty, B. S. Manoj
Small-world characteristic brings down average path length of a network by adding a few long-links among network node-pairs. In a real-world deployment scenario, probabilistic long-link addition cannot guarantee optimal value of average path length for a network with limited number of long-links. In this paper, we propose a generalized heuristic, Sequential Deterministic Long-link Addition (SDLA) algorithm to incorporate small-world property for moderate sized string topology networks. Our proposed algorithm has O(k × N) time complexity compared to O(N2(k+2) × log N) for optimal and O(k × N4 × log N) for near-optimal long-link addition strategies for k long links when a string topology network of size N is concerned. Our studies show that SDLA algorithm negligibly deviates in various network properties (e.g., average path length, average clustering coefficient, and graph centralities) from the optimal and near-optimal solutions.
{"title":"An efficient heuristics to realize near-optimal small-world networks","authors":"Abhishek Chakraborty, B. S. Manoj","doi":"10.1109/NCC.2015.7084862","DOIUrl":"https://doi.org/10.1109/NCC.2015.7084862","url":null,"abstract":"Small-world characteristic brings down average path length of a network by adding a few long-links among network node-pairs. In a real-world deployment scenario, probabilistic long-link addition cannot guarantee optimal value of average path length for a network with limited number of long-links. In this paper, we propose a generalized heuristic, Sequential Deterministic Long-link Addition (SDLA) algorithm to incorporate small-world property for moderate sized string topology networks. Our proposed algorithm has O(k × N) time complexity compared to O(N2(k+2) × log N) for optimal and O(k × N4 × log N) for near-optimal long-link addition strategies for k long links when a string topology network of size N is concerned. Our studies show that SDLA algorithm negligibly deviates in various network properties (e.g., average path length, average clustering coefficient, and graph centralities) from the optimal and near-optimal solutions.","PeriodicalId":302718,"journal":{"name":"2015 Twenty First National Conference on Communications (NCC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126488092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-04-16DOI: 10.1109/NCC.2015.7084906
Jom Kuriakose, J. Kumar, Sarala Padi, H. Murthy, Umayalpuram K. Sivaraman
Percussion instruments play a significant role in Carnatic music concerts. The percussion artist enjoys a great degree of freedom in improvising within the defined tala structure of a composition. The objective of this paper is to transcribe the improvisations, treating the percussion strokes as syllables or aksharas. Onset detection is performed to segment the waveform at each akshara. Using the transcriptions from the training data, a three-state Hidden Markov Model is built for each akshara. The language model is derived from the training data. Testing is also performed isolated style using onset detection to segment the phrase, and the language model to correct the transcription. Transcription is performed on both concert recordings and studio recordings. This technique yields upto ≈ 96% accuracy on studio recordings and ≈ 76% accuracy for concert recordings. As the mrudangam1 is an instrument that is based on tonic; tonic normalised features, namely, Cent Filterbank Cepstral coefficients are used. It is shown that tonic normalisation helps in transcription across different tonics.
{"title":"Akshara transcription of mrudangam strokes in Carnatic music","authors":"Jom Kuriakose, J. Kumar, Sarala Padi, H. Murthy, Umayalpuram K. Sivaraman","doi":"10.1109/NCC.2015.7084906","DOIUrl":"https://doi.org/10.1109/NCC.2015.7084906","url":null,"abstract":"Percussion instruments play a significant role in Carnatic music concerts. The percussion artist enjoys a great degree of freedom in improvising within the defined tala structure of a composition. The objective of this paper is to transcribe the improvisations, treating the percussion strokes as syllables or aksharas. Onset detection is performed to segment the waveform at each akshara. Using the transcriptions from the training data, a three-state Hidden Markov Model is built for each akshara. The language model is derived from the training data. Testing is also performed isolated style using onset detection to segment the phrase, and the language model to correct the transcription. Transcription is performed on both concert recordings and studio recordings. This technique yields upto ≈ 96% accuracy on studio recordings and ≈ 76% accuracy for concert recordings. As the mrudangam1 is an instrument that is based on tonic; tonic normalised features, namely, Cent Filterbank Cepstral coefficients are used. It is shown that tonic normalisation helps in transcription across different tonics.","PeriodicalId":302718,"journal":{"name":"2015 Twenty First National Conference on Communications (NCC)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115399757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-04-16DOI: 10.1109/NCC.2015.7084840
Hemant Suthar, D. Sarkar, K. Saurav, K. V. Srivastava
In this paper, an array of 7 × 7 novel compact metamaterial unit cells is used as superstrate to improve the broadside gain of a microstrip patch antenna operating at the WLAN band. The proposed unit cell is obtained by suitably adding extra metal strips to the conventional mirrored S like structures. The unit cell cell analysis and parameter extraction using periodic boundary condition confirms the near zero index behavior as well as significant reduction (almost 52%) in the unit cell footprint. Simulation and measurement results confirm that near-zero index metamaterial (NZIM) lens significantly improves the gain (by more than 2 dBi) and reduces the half power beamwidth in both E-plane and H-plane by 20°.
{"title":"Gain enhancement of microstrip patch antenna using near-zero index metamaterial (NZIM) lens","authors":"Hemant Suthar, D. Sarkar, K. Saurav, K. V. Srivastava","doi":"10.1109/NCC.2015.7084840","DOIUrl":"https://doi.org/10.1109/NCC.2015.7084840","url":null,"abstract":"In this paper, an array of 7 × 7 novel compact metamaterial unit cells is used as superstrate to improve the broadside gain of a microstrip patch antenna operating at the WLAN band. The proposed unit cell is obtained by suitably adding extra metal strips to the conventional mirrored S like structures. The unit cell cell analysis and parameter extraction using periodic boundary condition confirms the near zero index behavior as well as significant reduction (almost 52%) in the unit cell footprint. Simulation and measurement results confirm that near-zero index metamaterial (NZIM) lens significantly improves the gain (by more than 2 dBi) and reduces the half power beamwidth in both E-plane and H-plane by 20°.","PeriodicalId":302718,"journal":{"name":"2015 Twenty First National Conference on Communications (NCC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121321256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-04-16DOI: 10.1109/NCC.2015.7084884
A. Khan, S. M. Gulhane, Umesh W. Kaware
Wireless communication in underground mine aims to provide high data rate for voice and data communication among mine workers. Ultra Wide Band (UWB) technology has been seen to fulfil the above requirements. In this paper, application of 2D spreading to Multi Band Orthogonal Frequency Division Multiplexing UWB (MBOFDM-UWB) system is attempted and resulting Multi Band Orthogonal Frequency and Code Division Multiplexing UWB (MBOFCDM-UWB) system has been analysed for underground mine channel. An extended closed form analytical expression for Bit Error Rate (BER) by incorporating power decay coefficient for clusters (Γ), power decay coefficient for pulse within clusters (γch), cluster average arrival rate (Λ) and pulse average arrival rate (λ) within clusters is obtained for MBOFDM-UWB in Underground mine channel. The simulated BER results for MBOFDM-UWB system are observed to be nearly close to analytical results which validate the analysis. The simulation results have shown improvement in performance of MBOFCDM-UWB system as compare to MBOFDM-UWB system.
{"title":"High data rate MBOFCDM-UWB system for underground mine channel","authors":"A. Khan, S. M. Gulhane, Umesh W. Kaware","doi":"10.1109/NCC.2015.7084884","DOIUrl":"https://doi.org/10.1109/NCC.2015.7084884","url":null,"abstract":"Wireless communication in underground mine aims to provide high data rate for voice and data communication among mine workers. Ultra Wide Band (UWB) technology has been seen to fulfil the above requirements. In this paper, application of 2D spreading to Multi Band Orthogonal Frequency Division Multiplexing UWB (MBOFDM-UWB) system is attempted and resulting Multi Band Orthogonal Frequency and Code Division Multiplexing UWB (MBOFCDM-UWB) system has been analysed for underground mine channel. An extended closed form analytical expression for Bit Error Rate (BER) by incorporating power decay coefficient for clusters (Γ), power decay coefficient for pulse within clusters (γch), cluster average arrival rate (Λ) and pulse average arrival rate (λ) within clusters is obtained for MBOFDM-UWB in Underground mine channel. The simulated BER results for MBOFDM-UWB system are observed to be nearly close to analytical results which validate the analysis. The simulation results have shown improvement in performance of MBOFCDM-UWB system as compare to MBOFDM-UWB system.","PeriodicalId":302718,"journal":{"name":"2015 Twenty First National Conference on Communications (NCC)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131354401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}