Pub Date : 2011-07-20DOI: 10.1109/PACC.2011.5979019
K. Karthikeyan, J. Jaisheela, M. Dinesh Kumar, K. Senthil Kumar
Pulse Width Modulation is a method of controlling the amount of power to a load without having to dissipate any power in the load driver. PWM signals are widely used in telecommunications, power control systems, voltage regulation and in audio signal processing. This paper deals with the optimized power control in mobile applications. PWM power control systems became reality with the advent of modern semiconductor switches like MOSFETs and Insulated Gate bipolar transistor (IGBT). PWM signals can be easily generated using microcontrollers rather than Digital signal processors (DSP), but when the sensor data from light intensity sensors are processed in real time, then microcontrollers can no longer be used because of less accuracy and speed and this is where DSP comes into play. Programming a DSP to generate PWM signal in accordance with the sensor data is not an easy task since the interfacing codes are not as simple as for microcontrollers. Hence the simulation of the PWM signal has been done to study the efficiency of the C code. This work is a part of a project to develop DSP-FPGA based BLDC motor control.
{"title":"Sinusoidal PWM Signal Generation Using TMS320C6711 DSP for Power Control in Mobile Phones","authors":"K. Karthikeyan, J. Jaisheela, M. Dinesh Kumar, K. Senthil Kumar","doi":"10.1109/PACC.2011.5979019","DOIUrl":"https://doi.org/10.1109/PACC.2011.5979019","url":null,"abstract":"Pulse Width Modulation is a method of controlling the amount of power to a load without having to dissipate any power in the load driver. PWM signals are widely used in telecommunications, power control systems, voltage regulation and in audio signal processing. This paper deals with the optimized power control in mobile applications. PWM power control systems became reality with the advent of modern semiconductor switches like MOSFETs and Insulated Gate bipolar transistor (IGBT). PWM signals can be easily generated using microcontrollers rather than Digital signal processors (DSP), but when the sensor data from light intensity sensors are processed in real time, then microcontrollers can no longer be used because of less accuracy and speed and this is where DSP comes into play. Programming a DSP to generate PWM signal in accordance with the sensor data is not an easy task since the interfacing codes are not as simple as for microcontrollers. Hence the simulation of the PWM signal has been done to study the efficiency of the C code. This work is a part of a project to develop DSP-FPGA based BLDC motor control.","PeriodicalId":403612,"journal":{"name":"2011 International Conference on Process Automation, Control and Computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123092655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-07-20DOI: 10.1109/PACC.2011.5979035
Ms. D. Karthika Renuka, Dr. T. Hamsapriya, Mr. M. Raja Chakkaravarthi, Ms. P. Lakshmi Surya
E-mail is one of the most popular and frequently used ways of communication due to its worldwide accessibility, relatively fast message transfer, and low sending cost. The flaws in the e-mail protocols and the increasing amount of electronic business and financial transactions directly contribute to the increase in e-mail-based threats. Email spam is one of the major problems of the today‟s Internet, bringing financial damage to companies and annoying individual users. Spam emails are invading users without their consent and filling their mail boxes. They consume more network capacity as well as time in checking and deleting spam mails. The vast majority of Internet users are outspoken in their disdain for spam, although enough of them respond to commercial offers that spam remains a viable source of income to spammers. While most of the users want to do right think to avoid and get rid of spam, they need clear and simple guidelines on how to behave. In spite of all the measures taken to eliminate spam, they are not yet eradicated. Also when the counter measures are over sensitive, even legitimate emails will be eliminated. Among the approaches developed to stop spam, filtering is the one of the most important technique. Many researches in spam filtering have been centered on the more sophisticated classifier-related issues. In recent days, Machine learning for spam classification is an important research issue. The effectiveness of the proposed work is explores and identifies the use of different learning algorithms for classifying spam messages from e-mail. A comparative analysis among the algorithms has also been presented.
{"title":"Spam Classification Based on Supervised Learning Using Machine Learning Techniques","authors":"Ms. D. Karthika Renuka, Dr. T. Hamsapriya, Mr. M. Raja Chakkaravarthi, Ms. P. Lakshmi Surya","doi":"10.1109/PACC.2011.5979035","DOIUrl":"https://doi.org/10.1109/PACC.2011.5979035","url":null,"abstract":"E-mail is one of the most popular and frequently used ways of communication due to its worldwide accessibility, relatively fast message transfer, and low sending cost. The flaws in the e-mail protocols and the increasing amount of electronic business and financial transactions directly contribute to the increase in e-mail-based threats. Email spam is one of the major problems of the today‟s Internet, bringing financial damage to companies and annoying individual users. Spam emails are invading users without their consent and filling their mail boxes. They consume more network capacity as well as time in checking and deleting spam mails. The vast majority of Internet users are outspoken in their disdain for spam, although enough of them respond to commercial offers that spam remains a viable source of income to spammers. While most of the users want to do right think to avoid and get rid of spam, they need clear and simple guidelines on how to behave. In spite of all the measures taken to eliminate spam, they are not yet eradicated. Also when the counter measures are over sensitive, even legitimate emails will be eliminated. Among the approaches developed to stop spam, filtering is the one of the most important technique. Many researches in spam filtering have been centered on the more sophisticated classifier-related issues. In recent days, Machine learning for spam classification is an important research issue. The effectiveness of the proposed work is explores and identifies the use of different learning algorithms for classifying spam messages from e-mail. A comparative analysis among the algorithms has also been presented.","PeriodicalId":403612,"journal":{"name":"2011 International Conference on Process Automation, Control and Computing","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134314023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-07-20DOI: 10.1109/PACC.2011.5978901
A. P. Isvarya Luckshmi, P. Visalakshi, N. Karthikeyan
A phenomenal growth is witnessed in the development and deployment of wireless services. Wireless bandwidth is a scarce resource in a cellular mobile network and hence must be effectively utilized. This paper introduces two intelligent schemes to investigate the bandwidth allocation in cellular mobile networks namely Back Propagation Neural Network (BPN) and Particle Swarm Optimization (PSO). The performance objective is to maximize the bandwidth utilization while minimizing the bandwidth allocation for individual users. PSO and BPN methods are compared with the conventional Random Allocation and Linear Programming based Resource Reduction methods. Simulation results prove that the PSO method performs better than the BPN method.
{"title":"Intelligent Schemes for Bandwidth Allocation in Cellular Mobile Networks","authors":"A. P. Isvarya Luckshmi, P. Visalakshi, N. Karthikeyan","doi":"10.1109/PACC.2011.5978901","DOIUrl":"https://doi.org/10.1109/PACC.2011.5978901","url":null,"abstract":"A phenomenal growth is witnessed in the development and deployment of wireless services. Wireless bandwidth is a scarce resource in a cellular mobile network and hence must be effectively utilized. This paper introduces two intelligent schemes to investigate the bandwidth allocation in cellular mobile networks namely Back Propagation Neural Network (BPN) and Particle Swarm Optimization (PSO). The performance objective is to maximize the bandwidth utilization while minimizing the bandwidth allocation for individual users. PSO and BPN methods are compared with the conventional Random Allocation and Linear Programming based Resource Reduction methods. Simulation results prove that the PSO method performs better than the BPN method.","PeriodicalId":403612,"journal":{"name":"2011 International Conference on Process Automation, Control and Computing","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132213578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-07-20DOI: 10.1109/PACC.2011.5979007
S. Shivkumar, G. Umamaheswari
The growing popularity of mobile and hand held devices ignited the growth of wireless networks over the past years. Wireless data communications have transformed not only the business world but also the human society by improving efficiency, flexibility, convenience, and above all productivity. Wireless Local Area Networks (WLAN) typically emulate the wired networks traditional hub-spoke configuration. The best known and most widely used variation of the 802.11 WLAN standard is 802.11b. Encryption in 802.11b is provided by Wired Equivalent Privacy (WEP), which has many weaknesses and flaws. Therefore the IEEE ratified 802.11i WLAN security standard in June 2004. The new cryptography was based on the Advanced Encryption Standard (AES) algorithm. The Substitution box (S-box) in AES brings non linearity to cryptosystem and strengthens their cryptographic security. In this paper RC4 stream cipher is used to generate S-box for AES. The generated S-boxes are more dynamic and key dependent which will increase the complexity and make the differential and linear cryptanalysis more difficult.
{"title":"Performance Comparison of Advanced Encryption Standard (AES) and AES Key Dependent S-Box - Simulation Using MATLAB","authors":"S. Shivkumar, G. Umamaheswari","doi":"10.1109/PACC.2011.5979007","DOIUrl":"https://doi.org/10.1109/PACC.2011.5979007","url":null,"abstract":"The growing popularity of mobile and hand held devices ignited the growth of wireless networks over the past years. Wireless data communications have transformed not only the business world but also the human society by improving efficiency, flexibility, convenience, and above all productivity. Wireless Local Area Networks (WLAN) typically emulate the wired networks traditional hub-spoke configuration. The best known and most widely used variation of the 802.11 WLAN standard is 802.11b. Encryption in 802.11b is provided by Wired Equivalent Privacy (WEP), which has many weaknesses and flaws. Therefore the IEEE ratified 802.11i WLAN security standard in June 2004. The new cryptography was based on the Advanced Encryption Standard (AES) algorithm. The Substitution box (S-box) in AES brings non linearity to cryptosystem and strengthens their cryptographic security. In this paper RC4 stream cipher is used to generate S-box for AES. The generated S-boxes are more dynamic and key dependent which will increase the complexity and make the differential and linear cryptanalysis more difficult.","PeriodicalId":403612,"journal":{"name":"2011 International Conference on Process Automation, Control and Computing","volume":"10 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133651156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-07-20DOI: 10.1109/PACC.2011.5978970
Mary Tom, A. Chiou
Nutrition Related Diseases (NRD) are globally widespread causing substantial economic cost for governments and individuals. Formulating and maintaining a balanced diet meeting the Recommended Dietary Intake (RDI) is complex, time consuming task. The detailed analysis conducted in this study reveals many intellectual tasks involved in meals scheduling and diet formulation. This study reports the results of requirement analysis of a Ubiquitous Intelligence System for automating the diet formulation, monitoring and maintenance. The authors propose Dietary Intelligence System (DIligenS) that applies computational intelligence and has the architectural components of knowledge base, inference engine, data base and data extraction and conversion modules in addition to the knowledge building and application interface.
{"title":"Requirement Analysis of Ubiquitous Intelligence System for Personal Diet Formulation and Maintenance","authors":"Mary Tom, A. Chiou","doi":"10.1109/PACC.2011.5978970","DOIUrl":"https://doi.org/10.1109/PACC.2011.5978970","url":null,"abstract":"Nutrition Related Diseases (NRD) are globally widespread causing substantial economic cost for governments and individuals. Formulating and maintaining a balanced diet meeting the Recommended Dietary Intake (RDI) is complex, time consuming task. The detailed analysis conducted in this study reveals many intellectual tasks involved in meals scheduling and diet formulation. This study reports the results of requirement analysis of a Ubiquitous Intelligence System for automating the diet formulation, monitoring and maintenance. The authors propose Dietary Intelligence System (DIligenS) that applies computational intelligence and has the architectural components of knowledge base, inference engine, data base and data extraction and conversion modules in addition to the knowledge building and application interface.","PeriodicalId":403612,"journal":{"name":"2011 International Conference on Process Automation, Control and Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116603230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-07-20DOI: 10.1109/PACC.2011.5978932
V. Shanthi, S. Lalitha
Lexical chains are defined as clusters of semantically related words. The Lexical chaining architecture integrates domain dependent statistical word associations into the chaining process. The statistical word associations represent an additional type of lexical cohesive relationship that is not found in WordNet. The architecture also recognizes the gloss definitions which identifies the relations between two concepts not directly related.
{"title":"Lexical Chaining Process for Text Generations","authors":"V. Shanthi, S. Lalitha","doi":"10.1109/PACC.2011.5978932","DOIUrl":"https://doi.org/10.1109/PACC.2011.5978932","url":null,"abstract":"Lexical chains are defined as clusters of semantically related words. The Lexical chaining architecture integrates domain dependent statistical word associations into the chaining process. The statistical word associations represent an additional type of lexical cohesive relationship that is not found in WordNet. The architecture also recognizes the gloss definitions which identifies the relations between two concepts not directly related.","PeriodicalId":403612,"journal":{"name":"2011 International Conference on Process Automation, Control and Computing","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124767887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-07-20DOI: 10.1109/PACC.2011.5978924
R. Narne, J. Therattil, Laxmidhar Sahu, P. C. Panda
The design of a self tuning Static Synchronous Compensator (STATCOM) based on pole placement method is presented. In order to maintain good damping characteristics when there is a drastic change in system operating condition, the gain settings are adapted in real time based on the continuously measured system inputs and outputs. The new self tuning proportional integral (PI) control can provide better damping characteristics than a fixed gain PI control STATCOM over a wide range of operating conditions. Digital simulation of a two machine system following a three phase fault under different loading conditions is performed to demonstrate the robustness and effectiveness of the developed controller. Simulation results are presented at the end of the paper.
{"title":"Dynamic Stability Enhancement Using Self-Tuning Static Synchronous Compensator","authors":"R. Narne, J. Therattil, Laxmidhar Sahu, P. C. Panda","doi":"10.1109/PACC.2011.5978924","DOIUrl":"https://doi.org/10.1109/PACC.2011.5978924","url":null,"abstract":"The design of a self tuning Static Synchronous Compensator (STATCOM) based on pole placement method is presented. In order to maintain good damping characteristics when there is a drastic change in system operating condition, the gain settings are adapted in real time based on the continuously measured system inputs and outputs. The new self tuning proportional integral (PI) control can provide better damping characteristics than a fixed gain PI control STATCOM over a wide range of operating conditions. Digital simulation of a two machine system following a three phase fault under different loading conditions is performed to demonstrate the robustness and effectiveness of the developed controller. Simulation results are presented at the end of the paper.","PeriodicalId":403612,"journal":{"name":"2011 International Conference on Process Automation, Control and Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125431881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-07-20DOI: 10.1109/PACC.2011.5978971
Akhil Nair, T. Radhakrishnan, K. Srinivasan, S. Rominus Valsalam
Tangentially-fired furnaces (TFF) are vortex-combustion units and are widely used in steam generators of thermal power plants. Perfect modeling and simulation of furnace gas temperature is quite difficult, due to its complex aerodynamics of burning particles, flame stability and hot gas flow distribution throughout the furnace. The temperature of the furnace gas depends on many parameters such as the inclination angle (tilt angle), fuel quality, burn out percentage and the flow rates in the burners for each of the furnace corners. However, the measurements are not available in the existing furnace operated at Neyveli Lignite Corporation (NLC), Neyveli. Thus, state estimation of temperature is an important prerequisite for safe and economical process operations. It is an integral part of applications such as process monitoring, fault detection and diagnosis, process optimization, and model-based control. Because all the process variables are generally not measured, an observer can be designed to generate an estimate of the state by making use of the relevant process inputs, outputs, and process knowledge, in the form of a mathematical model. The aim is to design a good state estimator for the furnace. Linear Kalman Filter (LKF) and Extended Kalman Filter (EKF) algorithms are developed for this problem and simulation results are compared.
{"title":"Kalman Filter Based State Estimation of a Thermal Power Plant","authors":"Akhil Nair, T. Radhakrishnan, K. Srinivasan, S. Rominus Valsalam","doi":"10.1109/PACC.2011.5978971","DOIUrl":"https://doi.org/10.1109/PACC.2011.5978971","url":null,"abstract":"Tangentially-fired furnaces (TFF) are vortex-combustion units and are widely used in steam generators of thermal power plants. Perfect modeling and simulation of furnace gas temperature is quite difficult, due to its complex aerodynamics of burning particles, flame stability and hot gas flow distribution throughout the furnace. The temperature of the furnace gas depends on many parameters such as the inclination angle (tilt angle), fuel quality, burn out percentage and the flow rates in the burners for each of the furnace corners. However, the measurements are not available in the existing furnace operated at Neyveli Lignite Corporation (NLC), Neyveli. Thus, state estimation of temperature is an important prerequisite for safe and economical process operations. It is an integral part of applications such as process monitoring, fault detection and diagnosis, process optimization, and model-based control. Because all the process variables are generally not measured, an observer can be designed to generate an estimate of the state by making use of the relevant process inputs, outputs, and process knowledge, in the form of a mathematical model. The aim is to design a good state estimator for the furnace. Linear Kalman Filter (LKF) and Extended Kalman Filter (EKF) algorithms are developed for this problem and simulation results are compared.","PeriodicalId":403612,"journal":{"name":"2011 International Conference on Process Automation, Control and Computing","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125508838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-07-20DOI: 10.1109/PACC.2011.5978934
Manian Dhivya, Ashok Kumar Potnuru, M. Sundarambal
Wireless sensor networks consist of tiny sensor nodes with sensing, computation and wireless communication capabilities. The design of routing protocols is influenced by various factors like fault tolerance, energy efficiency, scalability, latency, power consumption and network topology. The primary design objective of research is determining the active nodes and enhancing the energy efficiency. In this paper a new protocol is proposed based on the characteristics of Threshold - sensitive Energy Efficient sensor Network protocol and Ad hoc On-demand Distance Vector. The simulation results show that the proposed protocol is efficient in transmission of packets, energy and throughput.
{"title":"Energy Efficient Routing Protocol for Wireless Sensor Networks","authors":"Manian Dhivya, Ashok Kumar Potnuru, M. Sundarambal","doi":"10.1109/PACC.2011.5978934","DOIUrl":"https://doi.org/10.1109/PACC.2011.5978934","url":null,"abstract":"Wireless sensor networks consist of tiny sensor nodes with sensing, computation and wireless communication capabilities. The design of routing protocols is influenced by various factors like fault tolerance, energy efficiency, scalability, latency, power consumption and network topology. The primary design objective of research is determining the active nodes and enhancing the energy efficiency. In this paper a new protocol is proposed based on the characteristics of Threshold - sensitive Energy Efficient sensor Network protocol and Ad hoc On-demand Distance Vector. The simulation results show that the proposed protocol is efficient in transmission of packets, energy and throughput.","PeriodicalId":403612,"journal":{"name":"2011 International Conference on Process Automation, Control and Computing","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125909708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2011-07-20DOI: 10.1109/PACC.2011.5978993
G. Prema, P. Ananthi
This paper proposes time, frequency and clock synchronization technique for a Q transmit and L receive (Q x L), Multiple-Input Multiple-Output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM) for Wireless Local Area Network (WLAN) systems. OFDM is a multi-carrier modulation scheme that transmits a large number of closely spaced sub-carriers to be modulated with a conventional modulation technique. MIMO OFDM is a promising candidate for achieving high data rate transmission in mobile environment. However OFDM technique is sensitive to time offset, frequency offset and clock offset. OFDM is resistant to multi-path fading; it requires a high degree of synchronization to maintain sub-carrier orthogonality. Estimating the start of the frame minimizes the Inter Symbol Interference (ISI) and estimating the correct Carrier Frequency Offset (CFO) and Sampling Clock Offset (SCO) minimizes the Inter Carrier Interference (ICI).
{"title":"Joint Timing, Carrier Frequency and Sampling Clock Offset Estimation for MIMO OFDM WLAN Systems","authors":"G. Prema, P. Ananthi","doi":"10.1109/PACC.2011.5978993","DOIUrl":"https://doi.org/10.1109/PACC.2011.5978993","url":null,"abstract":"This paper proposes time, frequency and clock synchronization technique for a Q transmit and L receive (Q x L), Multiple-Input Multiple-Output (MIMO) Orthogonal Frequency Division Multiplexing (OFDM) for Wireless Local Area Network (WLAN) systems. OFDM is a multi-carrier modulation scheme that transmits a large number of closely spaced sub-carriers to be modulated with a conventional modulation technique. MIMO OFDM is a promising candidate for achieving high data rate transmission in mobile environment. However OFDM technique is sensitive to time offset, frequency offset and clock offset. OFDM is resistant to multi-path fading; it requires a high degree of synchronization to maintain sub-carrier orthogonality. Estimating the start of the frame minimizes the Inter Symbol Interference (ISI) and estimating the correct Carrier Frequency Offset (CFO) and Sampling Clock Offset (SCO) minimizes the Inter Carrier Interference (ICI).","PeriodicalId":403612,"journal":{"name":"2011 International Conference on Process Automation, Control and Computing","volume":"293 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123111038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}