Proposed Approach for Improving Bluetooth Networks Security through SVD Audio Watermarking

Size: px
Start display at page:

Download "Proposed Approach for Improving Bluetooth Networks Security through SVD Audio Watermarking"

Transcription

1 Proposed pproach for Improvng Bluetooth Netorks Securty through SVD udo Watermarkng M.. M. El-Bendary,. Haggag Dept. of Electroncs echnology, Faculty of Industral Educaton, Helan Unversty. Caro, Egypt. F. Shak, and F. E. bd-el-same Dept. of Communcatons Engneerng Faculty of Elec. Engneerng, Menofa Unversty. Menof, Egypt. bstract Some of applcatons need mult-level securty. he paper proposes a novel approach IEEE Bluetooth netork to provde better secure lnk for essental applcatons. It proposes a ne approach for audo atermarkng usng the sngular value decomposton (SVD) mathematcal technque. hs approach s based on embeddng the encrypted mage n the sngular values of the audo sgnal after transformng t nto a 2- D format. fter atermark embeddng, the audo sgnal s transformed agan nto a 1-D format. he 1-D audo sgnal s segmented to Bluetooth packet payload length. hat leads to the needs of fragmentaton of the mage to small segments. In the proposed technque the chaotc encrypton s used for encrypt the mage. It mproves the qualty of extracted mages as proved expermentally, here t ressts the nose and dfferent attacks. he paper uses to type of Bluetooth packets (2DH1 and 2DM1), uncoded Enhanced Data Rate (EDR) and encoded EDR packets respectvely. t the recever the segments are recollected to construct atermark sgnal. he fnal step s extractng the mage. Experments of the smulaton are carred over fadng channel. Expermental results sho that the proposed audo atermarkng approach mantans the hgh qualty of the audo sgnal and that the atermark extracton and decrypton are possble. Keyords: udo Watermarkng, IEEE (Bluetooth echnology), SVD, Fadng channel, Copyrght Protecton. I. INRODUCION Wth ncreasng utlzaton of reless devces, especally Bluetooth and Bluetooth devces, the need of securty of data s ncreased. In ths paper, e use dgtal atermarkng technque for enhance the securty over Bluetooth netork. Because of usng ths reless technology for transmttng very mportant data or mages hch must be secured (.e. medcal applcaton), e propose ths technque [1]. Dgtal Watermarkng has found many applcatons n mage, vdeo and audo transmsson. Watermarkng s the art of embeddng a pece of nformaton n a cover sgnal. Watermarkng can acheve several objectves such as nformaton hdng, copyrght protecton, fngerprntng and authentcaton [2]. Several algorthms have been proposed for atermarkng, especally for mage and vdeo atermarkng [3-5]. Some of these algorthms are desgned for the effcent embeddng and detecton of the atermark, but most of them am at the successful extracton of the embedded atermark. On the other hand, most of the audo atermarkng algorthms are desgned to acheve an effcent detecton of the atermark thout extractng meanngful nformaton from the atermarked audo sgnal [6-7].desgned to acheve an effcent detecton of the atermark thout extractng meanngful nformaton from the atermarked audo sgnal [6-7]. here s a need for a robust audo atermarkng approach th a hgher degree of securty, hch can be acheved by embeddng encrypted mages n audo sgnals. In ths paper, the chaotc Baker map s used for the encrypton of the atermark mage [8-9]. hen, the atermark s embedded n the audo sgnal usng the SVD mathematcal technque. he audo sgnal s transformed nto a 2-D format and the sngular values (SVs) of the resultng 2-D matrx are used for atermark embeddng. he paper s organzed as follos. In secton II, IEEE Bluetooth system s dscussed. III explans the proposed SVD-based audo atermarkng approach. In secton IV the proposed algorthm th Bluetooth s dscussed. he smulaton results are ntroduced n secton V. Fnally, the paper s concluded n secton VI. II. BLUEOOH SYSEM IEEE s a short-range reless communcaton standard defned as cable replacement for Wreless Personal rea Netork (WPN) standard [10] amed at provdng smple, lo-cost communcaton netorks. cable replacement standard has been defned because cables lmt moblty of the consumer; they are cumbersome to carry around, are easly lost or broken. Often connectors are prone to dffcult to dagnose falures; or are propretary. o counteract these lmtatons Bluetooth s desgned to be lght and portable. It can be embedded to take the rggers of physcal knocks and shocks. It ncludes standards and protocols to make t moble, robust, relable and not lmted to one manufacturer. Bluetooth operates n the unlcensed 2.4 GHz ISM (Industral Scentfc Medcal) frequency band, hch s also utlzed by varous reless and rado technologes, such as IEEE b/g standard, IEEE standard, cordless

2 telephones, and even mcroave ovens. Bluetooth employs the Frequency Hoppng Spread Spectrum (FHSS) technque to mtgate the nterferences caused by other reless servces, coexstng n the 2.4 GHz frequency band. he Bluetooth technology presents the ndustral specfcatons of reless personal area netorks (PNs), here t provdes reless meda to connect and exchange nformaton beteen devces. Bluetooth employs varable-sze packets. hese packets occupy dfferent number of tme-slots up to a maxmum of fve slots; each tme-slot length s 625µs. Bluetooth v. 2.1 has brought EDR packets types. hese EDR packets support gross ar rates of 2 Mbps and 3 Mbps through Л/4-DQPSK and 8DPSK modulaton respectvely [11]. In unrestrcted countres the rados hop n pseudo random sequences around all avalable channels, ths equates to 79 RF channels th a channel spacng of 1 MHz. Startng at a base frequency of 2402 MHz then the frequency of the channels, f, can be expressed as: f = n MHz Where, n, s the channel number th an nteger value n the range of 0 to 78. In ths FHSS scheme there are 1600 hops per second, hch s a hop every 625 µs. Part of ths hop tmng s taken up by the guard tme of 220 µs allong the syntheszer tme to settle. he frequency hoppng mplements tme dvson multplexng as shon n Fgure 2. he bass of the scheme has the Master devce transmttng n the frst 625 us slot, k, and here the Slave receves. In the next slot k = 1 the Slave s permtted to transmt and the master lstens [12]. here are many versons of Bluetooth, theses versons am to mprove the capablty of the Bluetooth system. he standard packet format for old versons of Bluetooth s shon n Fgure 1, hle the format of EDR Bluetooth packets s gven n Fgure 2. he Bluetooth Packet contans three man felds C, HD, and Payload feld. he functon of the access code (C) s to dentfy the packets exchanged thn a pconet, here each pconet has a unque access code. he access code s used to synchronze the slaves n a pconet to ther master. he man functon of the header (HD) of the Bluetooth packet s to determne an ndvdual slave address n the pconet by Logcal ransport-ddress (L_DDR) [12]. 72bts 54 bts C HD PL LSB bts Fgure 1. Bluetooth classc packets format MSB GFSK 5µs DPSK Fgure 2. Bluetooth EDR packet format he last feld of the Bluetooth packet s the payload. he functons of C and HD are not changed n EDR packets. We focus n our study on a certan type of Bluetooth packets called CL packets hch refers to synchronous connectonless. Packets of the CL payload may be one of to types; DMx and DHx. he M refers to medum data rate packets, hle H refers to hgh data rate packets. he symbol x denotes the number of tme slots beteen to hops n the frequency hoppng system used [8]. It takes value 1, 3, and 5 referrng to 1, 3, or 5 tme slots beteen consecutve frequency hops. lays DMx packets are coded packets and DHx packets are uncoded packets [9]. Bluetooth has three dfferent modes of securty. Each Bluetooth devce can operate n one mode only at a tme. hese three modes are the follong: securty mode 1- non-secure mode, securty mode 2- servce-level enforced securty mode, and securty mode 3- lnk-level enforced securty mode. In securty mode 1, there s not any securty procedure. In ths mode the securty functonalty such as authentcaton and encrypton s bypassed. In securty mode 2, the securty procedures are ntated after the connecton establshment at Logcal Lnk Control and daptaton Protocol (L2CP). In securty mode 3, t s the lnk-level securty mode, a Bluetooth devce ntate the securty procedure before the channel s establshed [10]. III. C HD Guard Sync PL HE PROPOSED SVD UDIO WERMRKING PPROCH In ths secton, the proposed approach s presented he SVD algorthm s exploted n mage atermarkng [13-15]. In ths paper, ths dea s extended nto audo atermarkng. he SVD mathematcal technque provdes an elegant ay for extractng algebrac features from a 2-D matrx. he man propertes of the matrx of the SVs can be exploted n audo atermarkng. When a small perturbaton happens to the orgnal data matrx, no large varatons occur n the matrx of sngular values, hch makes ths technque robust aganst attacks [13-15]. In our smulaton, e assume the sde nformaton s error free. he steps of the proposed SVD audo atermark embeddng algorthm are summarzed as follos: he 1- D audo sgnal s transformed nto a 2-D matrx ( matrx). he SVD s performed on the matrx. USV (1)

3 he chaotc encrypted atermark (W matrx) s added to the SVs of the orgnal matrx. D S KW (2) small value of K of about 0.01 s requred to keep the audo sgnal undstorted. he SVD s performed on the ne modfed matrx (D matrx). D U S V he atermarked sgnal n 2-D format ( matrx) s obtaned usng the modfed matrx of SVs (S matrx). US V 6. he 2-D matrx s transformed agan nto a 1-D audo sgnal. o extract the possbly corrupted atermark from the possbly dstorted atermarked audo sgnal, gven U, S, V matrces and the possbly dstorted audo sgnal, the above steps are reversed as follos: he 1-D audo sgnal s transformed nto a 2-D matrx. he refers to the corrupton due to attacks. he SVD s performed on the possbly dstorted atermarked mage ( matrx). U S V he matrx that ncludes the atermark s computed. D U S V he possbly corrupted encrypted atermark s obtaned. W D S/ K (7) 5. he obtaned matrx W s decrypted. 6. he correlaton coeffcent beteen the decrypted matrx and the orgnal atermark s estmated. If ths coeffcent s hgher than a certan threshold, the atermark s present. he proposed algorthm can select the encrypton or no encrypton of the embedded mage that s accordng to the value of securty e ant or the mportance of ths mage. Chaotc encrypton of the encrypted mage s performed usng the chaotc Baker map. he Baker map s a chaotc map that generates a permuted verson of a square matrx [16]. In ts dscretzed form, the Baker map s an effcent tool to randomze a square matrx of data. he dscretzed map can be represented for an MxM matrx as follos: M M n M Br, s ( r M) s mod, ss mod M n n M n (8) (3) (4) (5) (6) B( r, s) are the ne ndces of the data tem Where ( r, s) at M n1 n2 n. M, r M n, 0 s M, and M In steps, the chaotc encrypton s performed as follos: n N N square matrx s dvded nto k rectangles of dth n and number of elements N. he elements n each rectangle are rearranged to a ro n the permuted rectangle. Rectangles are taken from left to rght begnnng th upper rectangles then loer ones. Insde each rectangle, the scan begns from the bottom left corner toards upper elements. Fgure (3) shos an example of the chaotc encrypton of an 88 square matrx. he secret key, Skey = (n1, n2, n3) = (2, 4, 2). IV. Orgnal square matrx. Chaotc encrypted matrx. Fgure 3. Chaotc encrypton of an 8 8 matrx. HE PROPOSED LGORIHM WIH BLUEOOH Our smulaton experments are carred out over the 2.4GHz band Bluetooth smulatons. Due to the lmts of the packets sze the fragment of mage s mportant for complete the transmsson. he physcal layer of Bluetooth supports transfer of only small sze packets lmted form bts that s for classc Bluetooth packets. Our smulaton experments are carred out by usng 2DH1 packets, 2DH1 packet s one of CL lnk packets. hs packet carres 480 bts Payload (PL) uncoded data. In ths paper, e proposed usng default 2DH1 packet and proposed packets through usng standard error control codes scheme of old Bluetooth versons, (Hammng (15, 10) code. Lmts of packets lengths lead to fragmentaton of bt streams of mage. In our smulaton, e assume the length of each segment s 512 bts. he process of fragmentaton s the last step n our proposed algorthm [17,18]. he fragmentaton here s carred out over the atermarked sgnal (gven n equaton 4). he 2-D matrx s transformed nto a 1-D audo sgnal. It ll be converted to dgtal data. So, e ll get long stream of

4 bts. he sze of s 256x256, so the follong equaton: (Im agesze ) No. Segments 512( ZgbeePacketLength ) (Im agesze ) No. Segments 317( ZgbeePacketLength ) (9) (10) mpltude me (s) Equaton 9 gves the number of segments n the case of standard 2DH1 packets. he number of segments n the case of encoded 2DH1 packets (2DM1) s gven by Equaton 10. fter the fragmentaton process s fnshed, the transmsson of packets ll start. he length packets n our smulaton cases are proposed for smplfy the smulaton and fragment the mage. t the recever the receved packets are collected and construct the receved atermark sgnal. fter reconstructng receved atermark sgnal complete, the extractng of embedded mage start. If the embedded mage s encrypted, t ll be decrypted by chaotc decrypton. Fgure 5. Orgnal aveform of audo sgnal In the frst experment, the proposed SVD audo encrypted atermarkng embeddng and extracton processes are performed over uncorrelated fadng channel through Bluetooth smulaton usng standard 2DH 1 packets. he results of experment are shon n Fgs.(6) and (7) at SNR=20 db and 40 db, respectvely. It s clear from these results that the SVD audo atermarkng doesn't degrade the qualty of the atermarked audo sgnal. It s also clear that the atermark s perfectly reconstructed. V. SIMULION RESULS In ths secton, several experments are carred out to test the performance of the proposed SVD audo atermarkng approach over Bluetooth netork. he Chaotc Baker map s used to encrypt the atermark mage as shon n Fg. (4). he encrypted mage s then used as a atermark to be embedded n the Handel sgnal avalable n Matlab. he Handel aveform s gven n Fgure (5). In all our experments, the PSNR s used for the evaluaton of the qualty of the atermarked audo sgnals and the correlaton coeffcent s used to measure the closeness of the decrypted atermark to the orgnal atermark. Fgure 6. Watermark mage (2DH1). he extracted mage at SNR=20dB. he receved atermark sgnal at SNR=20dB, encrypted atermark cr= Fgure 4. Watermark mage. Orgnal atermark. Chaotc encrypted atermark cr= Fgure 7. Watermark mage(2dh1). he extracted mage at SNR=40dB. he receved atermark sgnal at SNR=40dB, encrypted atermark cr= 0.99.

5 he experment gves the results of the prevous experments for dfferent values of SNR. s shon from the extracted mages over Bluetooth the SVD audo atermarkng doesn't degrade the qualty of the atermarked audo sgnal. In the second experment, the prevous one s repeated but th usng encoded 2DM 1 packets. he results are shon n Fgs. (8) and (9) at SNR= 20 db and 40 db respectvely. approach. In ths algorthm, encrypted mage s embedded as atermarks n audo sgnals to acheve a hgh degree of securty. Expermental results have proved that atermark embeddng n the proposed approach does not deterorate the audo sgnals. It has been clear through experments that the chaotc Baker map encrypton algorthm s an effcent algorthm for atermark encrypton. comparson study beteen the to mplementatons of to types of Bluetooth system, encoded and uncoded 2DH 1 EDR packets. Usng standard error control code of Bluetooth gves a lttle mprovng on the extracted mage. Fgure 8. Watermark mage (2DM1). he extracted mage at SNR=20dB. he extracted encrypted mage at SNR=20dB, encrypted atermark cr= Fgure 9. Watermark mage(2dm1). he extracted mage at SNR=40dB. he extracted encrypted mage at SNR=40dB, encrypted atermark cr= he experment gves the results of the prevous experments for dfferent values of SNR. s shon from the extracted mages over Bluetooth the SVD audo atermarkng doesn't degrade the qualty of the atermarked audo sgnal. lso, the experments reveal usng chaotc encrypton atermark th SVD technque enhance the securty over Bluetooth system and mprove the extractng of embedded mage process. s shon from the results of the prevous experments and the tables of results. REFERENCES [1] G. Pekhteryev, Z. Sahnoglu, P. Orlk, and G. Bhatt, Image ransmsson over IEEE and Bluetooth Netorks, IEEE ISCS May 2005, Kobe Japan. [2] B. Macq, J. Dttmann, and E. J. Delp, Benchmarkng of Image Watermarkng lgorthms for Dgtal Rghts Management, Proceedngs of he IEEE, Vol. 92, No. 6, pp , [3] Z. M. Lu, D. G. Xu, and S. H. Sun, Multpurpose Image Watermarkng lgorthm Based on Multstage Vector Quantzaton IEEE ransactons on Image Processng, Vol. 14, No. 6, pp , [4] H. S. Km and H. K. Lee, Invarant Image Watermark Usng Zernke Moments, IEEE ransactons on Crcuts nd Systems For Vdeo echnology, Vol. 13, No. 8, pp , [5] W. C. Chu, DC-Based Image Watermarkng Usng Subsamplng, IEEE ransactons on Multmeda, Vol. 5, No. 1, pp.34-38, [6] L. Ghout,. Bourdane, M. K. Ibrahm, and Sad Boussakta, Dgtal Image Watermarkng Usng Balanced Multavelets, IEEE ransactons on Sgnal Processng, Vol. 54, No. 4,pp , [7] S. Xang and J. Huang, Hstogram-Based udo Watermarkng ganst me-scale Modfcaton and Croppng ttacks, IEEE ransactons on Multmeda, Vol. 9, No. 7, pp , [8] Z. Lu and. Inoue, udo Watermarkng echnques Usng Snusodal Patterns Based on Pseudorandom Sequences, IEEE ransactons On Crcuts nd Systems For Vdeo echnology, Vol. 13, No. 8, pp , [9]. N. Lemma, J. prea, W. Oomen, and L. V. de Kerkhof, emporal Doman udo Watermarkng echnque, IEEE ransactons on Sgnal Processng, Vol. 51, No. 4, pp , [10] G. M. Waleed, M. Fazal, R. B. hmed, M. Fareq, B. bd Malek, and M. lf Ghan Bluetooth Wreless Netork uthentcaton Usng Rado Frequency Communcaton protocol, Journal of Computer Scence 5 (9): ,2009. [11] IEEE Wpan-Ir ask Group, [12] M. Ise, Y. Ogasahara, K. Watanabe, M. Hatanaka,. Onoye, H. Namoto, I. Kesh, and I. Shrakaa, Desgn and Implementaton of Home Netork Protocol for pplance Control Based on IEEE , IJCSNS Internatonal Journal of Computer Scence and Netork 20 Securty, VOL.7 No.7, July 2007 [13] B. P. Lath, Modern dgtal and analog communcaton systems, 2nd edton, Holt, Rnehart and Wnston, [14] R. Lu and. an, n SVD-Based Watermarkng Scheme for Protectng Rghtful Onershp, IEEE ransactons On Multmeda, Vol. 4, No. 1, pp , MRCH VI. CONCLUSIONS hs paper has presented an effcent securty algorthm for Bluetooth netork through SVD audo atermarkng

CONTOURLET TRANSFORM BASED WATERMARKING FOR COLOUR IMAGES

CONTOURLET TRANSFORM BASED WATERMARKING FOR COLOUR IMAGES he Internatonal Journal of Multmeda & Its Applcatons (IJMA) Vol.3, No.1, February 211 CONOURLE RANSFORM BASED WAERMARKING FOR COLOUR IMAGES Dnesh Kumar 1 and Vjay Kumar 2 1 Department of Computer Scence

More information

Tamper Localization in Wavelet Domain Using Semi- Fragile Watermarking

Tamper Localization in Wavelet Domain Using Semi- Fragile Watermarking Tamper Localzaton n Wavelet Doman Usng Sem- Fragle Watermarkng Sandpbha Mangrolya, Ketk Pathak Departement of Electroncs and Communcaton Engneerng Sarvajank College of Engneerng & Technology, Surat Abstract

More information

Chaotic Filter Bank for Computer Cryptography

Chaotic Filter Bank for Computer Cryptography Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College

More information

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,

More information

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com

More information

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol., No., November 23, 3-9 Rejecton of PSK Interference n DS-SS/PSK System Usng Adaptve Transversal Flter wth Condtonal Response Recalculaton Zorca Nkolć, Bojan

More information

High Speed, Low Power And Area Efficient Carry-Select Adder

High Speed, Low Power And Area Efficient Carry-Select Adder Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs

More information

HUAWEI TECHNOLOGIES CO., LTD. Huawei Proprietary Page 1

HUAWEI TECHNOLOGIES CO., LTD. Huawei Proprietary Page 1 Project Ttle Date Submtted IEEE 802.16 Broadband Wreless Access Workng Group Double-Stage DL MU-MIMO Scheme 2008-05-05 Source(s) Yang Tang, Young Hoon Kwon, Yajun Kou, Shahab Sanaye,

More information

Robust Block Selection for Watermarking Video Streams

Robust Block Selection for Watermarking Video Streams Proceedngs of the World Congress on Engneerng 8 Vol I WCE 8, July - 4, 8, London, U.K. Robust Block Selecton for Watermarkng Vdeo Streams Tamás Polyák, Gábor Fehér Abstract In ths paper a robust vdeo atermarkng

More information

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department

More information

Calculation of the received voltage due to the radiation from multiple co-frequency sources

Calculation of the received voltage due to the radiation from multiple co-frequency sources Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons

More information

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding Sde-Match Vector Quantzers Usng Neural Network Based Varance Predctor for Image Codng Shuangteng Zhang Department of Computer Scence Eastern Kentucky Unversty Rchmond, KY 40475, U.S.A. shuangteng.zhang@eku.edu

More information

An Efficient Blind Watermarking Method based on Significant Difference of Wavelet Tree Quantization using Adaptive Threshold

An Efficient Blind Watermarking Method based on Significant Difference of Wavelet Tree Quantization using Adaptive Threshold Internatonal Journal of Electroncs and Electrcal Engneerng Vol., No., June 3 An Effcent Blnd ng Method based on Sgnfcant Dfference of Wavelet Tree Quantzaton usng Adaptve Threshold Then Huynh The Unversty

More information

IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING

IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING U.P.B. Sc. Bull., Seres C, Vol. 77, Iss. 4, 015 ISSN 86-3540 IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING Radu Ovdu PREDA 1, Ioana MARCU, Amela CIOBANU 3 In ths paper a novel

More information

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme Proceedngs of the World Congress on Engneerng 2011 Vol II, July 6-8, 2011, London, U.K. Inverse Halftonng Method Usng Pattern Substtuton Based Data Hdng Scheme Me-Y Wu, Ja-Hong Lee and Hong-Je Wu Abstract

More information

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System Int. J. Communcatons, Network and System Scences, 10, 3, 1-5 do:10.36/jcns.10.358 Publshed Onlne May 10 (http://www.scrp.org/journal/jcns/) The Performance Improvement of BASK System for Gga-Bt MODEM Usng

More information

A High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode

A High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode A Hgh-Senstvty Oversamplng Dgtal Sgnal Detecton Technque for CMOS Image Sensors Usng Non-destructve Intermedate Hgh-Speed Readout Mode Shoj Kawahto*, Nobuhro Kawa** and Yoshak Tadokoro** *Research Insttute

More information

On the Feasibility of Receive Collaboration in Wireless Sensor Networks

On the Feasibility of Receive Collaboration in Wireless Sensor Networks On the Feasblty of Receve Collaboraton n Wreless Sensor Networs B. Bantaleb, S. Sgg and M. Begl Computer Scence Department Insttute of Operatng System and Computer Networs (IBR) Braunschweg, Germany {behnam,

More information

Digital Transmission

Digital Transmission Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal

More information

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht 68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly

More information

A study of turbo codes for multilevel modulations in Gaussian and mobile channels

A study of turbo codes for multilevel modulations in Gaussian and mobile channels A study of turbo codes for multlevel modulatons n Gaussan and moble channels Lamne Sylla and Paul Forter (sylla, forter)@gel.ulaval.ca Department of Electrcal and Computer Engneerng Laval Unversty, Ste-Foy,

More information

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b 2nd Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 207) Research of Dspatchng Method n Elevator Group Control System Based on Fuzzy Neural Network Yufeng

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems APSIPA ASC 2011 X an Throughput Maxmzaton by Adaptve Threshold Adjustment for AMC Systems We-Shun Lao and Hsuan-Jung Su Graduate Insttute of Communcaton Engneerng Department of Electrcal Engneerng Natonal

More information

Double-lock for image encryption with virtual optical wavelength

Double-lock for image encryption with virtual optical wavelength Double-lock for mage encrypton wth vrtual optcal wavelength Xang Peng Natonal Laboratory of Precson Measurement Technology and Instrumentaton, Tanjn Unversty, 30007 Tanjn, Chna Lngfeng Yu, and Llong Ca

More information

A Novel and Secure technique for image. Steganography using DWT

A Novel and Secure technique for image. Steganography using DWT Internatonal Journal of Computer Technology and Electroncs Engneerng (IJCTEE) Volume 3 Issue 5 October 2013 A Novel and Secure technque for mage Abstract: Steganography s the art and scence of hdng nformaton

More information

SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS

SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS Journal of Engneerng Scence and echnology Vol. 7, No. 4 ( 55-56 School of Engneerng, aylor s Unversty SECURE COMMUNICAION BY USING MULIPLE KEYS HAVING VARIABLE LENGH IN A REAL IME ENVIRONMEN FOR MULIPLE

More information

AN IMPROVED BIT LOADING TECHNIQUE FOR ENHANCED ENERGY EFFICIENCY IN NEXT GENERATION VOICE/VIDEO APPLICATIONS

AN IMPROVED BIT LOADING TECHNIQUE FOR ENHANCED ENERGY EFFICIENCY IN NEXT GENERATION VOICE/VIDEO APPLICATIONS Journal of Engneerng Scence and Technology Vol., o. 4 (6) 476-495 School of Engneerng, Taylor s Unversty A IMPROVED BIT LOADIG TECHIQUE FOR EHACED EERGY EFFICIECY I EXT GEERATIO VOICE/VIDEO APPLICATIOS

More information

Adaptive Modulation for Multiple Antenna Channels

Adaptive Modulation for Multiple Antenna Channels Adaptve Modulaton for Multple Antenna Channels June Chul Roh and Bhaskar D. Rao Department of Electrcal and Computer Engneerng Unversty of Calforna, San Dego La Jolla, CA 993-7 E-mal: jroh@ece.ucsd.edu,

More information

THE USE OF CONVOLUTIONAL CODE FOR NARROWBAND INTERFERENCE SUPPRESSION IN OFDM-DVBT SYSTEM

THE USE OF CONVOLUTIONAL CODE FOR NARROWBAND INTERFERENCE SUPPRESSION IN OFDM-DVBT SYSTEM THE USE OF CONVOLUTIONAL CODE FOR NARROWBAND INTERFERENCE SUPPRESSION IN OFDM-DVBT SYSTEM Azura Abdullah, Muhammad Sobrun Jaml Jamal, Khazuran Abdullah, Ahmad Fadzl Ismal and An Lza Asnaw Department of

More information

Multipath Propagation. Outline. What is OFDM? (OFDM) for Broadband Communications and. Orthogonal Frequency Division Multiplexing

Multipath Propagation. Outline. What is OFDM? (OFDM) for Broadband Communications and. Orthogonal Frequency Division Multiplexing Orthogonal Dvson Multplexng (OFDM) for Broadband Communcatons and Dgtal Audo Broadcastng (DAB) Klaus Wtrsal wtrsal@nw.tugraz.at VL: Dgtale Audotechnk, 21. März, 2002 What s OFDM? Modulaton technque Requres

More information

Revision of Lecture Twenty-One

Revision of Lecture Twenty-One Revson of Lecture Twenty-One FFT / IFFT most wdely found operatons n communcaton systems Important to know what are gong on nsde a FFT / IFFT algorthm Wth the ad of FFT / IFFT, ths lecture looks nto OFDM

More information

Secure Transmission of Sensitive data using multiple channels

Secure Transmission of Sensitive data using multiple channels Secure Transmsson of Senstve data usng multple channels Ahmed A. Belal, Ph.D. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. aabelal@hotmal.com

More information

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS INTRODUCTION Because dgtal sgnal rates n computng systems are ncreasng at an astonshng rate, sgnal ntegrty ssues have become far more mportant to

More information

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957

More information

SC-FDMA and OFDMA: An Efficient Wireless Image Transmission Schemes

SC-FDMA and OFDMA: An Efficient Wireless Image Transmission Schemes Journal of Control and Systems Engneerng 016, Vol. 4 Iss. 1, PP. 74-83 Frst onlne: 8 July 016 SC-FDMA and OFDMA: An Effcent Wreless Image Transmsson Schemes Fasal S. Al-Kamal 1, Abdullah A. Qasem, Samah

More information

High Speed ADC Sampling Transients

High Speed ADC Sampling Transients Hgh Speed ADC Samplng Transents Doug Stuetzle Hgh speed analog to dgtal converters (ADCs) are, at the analog sgnal nterface, track and hold devces. As such, they nclude samplng capactors and samplng swtches.

More information

Impact of Interference Model on Capacity in CDMA Cellular Networks. Robert Akl, D.Sc. Asad Parvez University of North Texas

Impact of Interference Model on Capacity in CDMA Cellular Networks. Robert Akl, D.Sc. Asad Parvez University of North Texas Impact of Interference Model on Capacty n CDMA Cellular Networks Robert Akl, D.Sc. Asad Parvez Unversty of North Texas Outlne Introducton to CDMA networks Average nterference model Actual nterference model

More information

An Efficient Energy Adaptive Hybrid Error Correction Technique for Underwater Wireless Sensor Networks

An Efficient Energy Adaptive Hybrid Error Correction Technique for Underwater Wireless Sensor Networks World Academy of Scence, Engneerng and Technology 5 2 An Effcent Energy Adaptve Hybrd Error Correcton Technque for Underwater Wreless Sensor Networks Ammar Elyas babker, M.Nordn B. Zakara, Hassan Yosf,

More information

Harmonic Balance of Nonlinear RF Circuits

Harmonic Balance of Nonlinear RF Circuits MICROWAE AND RF DESIGN Harmonc Balance of Nonlnear RF Crcuts Presented by Mchael Steer Readng: Chapter 19, Secton 19. Index: HB Based on materal n Mcrowave and RF Desgn: A Systems Approach, nd Edton, by

More information

Spread Spectrum based M-ary Modulated Robust Image Watermarking

Spread Spectrum based M-ary Modulated Robust Image Watermarking 54 IJCSS Internatonal Journal of Computer Scence and etwor Securty, VOL.7 o., October 27 Spread Spectrum based M-ary Modulated Robust Image atermarng T. S. Das, V. H. Manar 2 and S. K. Sarar 3, Dept. of

More information

The Application of Interpolation Algorithms in OFDM Channel Estimation

The Application of Interpolation Algorithms in OFDM Channel Estimation The Applcaton of Interpolaton Algorthms n OFDM Estmaton Xjun ZHANG 1,, Zhantng YUAN 1, 1 School of Electrcal and Informaton Engneerng, Lanzhou Unversty of Technology, Lanzhou, Gansu 730050, Chna School

More information

Steganography in JPEG2000 Compressed Images

Steganography in JPEG2000 Compressed Images 824 IEEE Transactons on Consumer Electroncs, Vol. 49, No. 4, NOVEMBER 2003 Steganography n JPEG2000 Compressed Images Po-Chy Su and C.-C. Jay Kuo, Fellow, IEEE Abstract Informaton hdng n JPEG2000 compressed

More information

DVB-T/H Digital Television Transmission and its Simulation over Ricean and Rayleigh Fading Channels

DVB-T/H Digital Television Transmission and its Simulation over Ricean and Rayleigh Fading Channels DVB-T/H Dgtal Televson Transmsson and ts Smulaton over Rcean and Raylegh Fadng Channels Ladslav Polák, Tomáš Kratochvl Department of Rado Electroncs, Brno Unversty of Technology, Purkyňova 118, 612 Brno,

More information

Space Time Equalization-space time codes System Model for STCM

Space Time Equalization-space time codes System Model for STCM Space Tme Eualzaton-space tme codes System Model for STCM The system under consderaton conssts of ST encoder, fadng channel model wth AWGN, two transmt antennas, one receve antenna, Vterb eualzer wth deal

More information

Evaluate the Effective of Annular Aperture on the OTF for Fractal Optical Modulator

Evaluate the Effective of Annular Aperture on the OTF for Fractal Optical Modulator Global Advanced Research Journal of Management and Busness Studes (ISSN: 2315-5086) Vol. 4(3) pp. 082-086, March, 2015 Avalable onlne http://garj.org/garjmbs/ndex.htm Copyrght 2015 Global Advanced Research

More information

Chinese Remainder. Discrete Mathematics Andrei Bulatov

Chinese Remainder. Discrete Mathematics Andrei Bulatov Chnese Remander Introducton Theorem Dscrete Mathematcs Andre Bulatov Dscrete Mathematcs Chnese Remander Theorem 34-2 Prevous Lecture Resdues and arthmetc operatons Caesar cpher Pseudorandom generators

More information

Pulse Extraction for Radar Emitter Location

Pulse Extraction for Radar Emitter Location 00 Conference on Informaton Scences and Systems, The Johns opkns Unversty, March 3, 00 Pulse Extracton for Radar Emtter Locaton Mark L. Fowler, Zhen Zhou, and Anupama Shvaprasad Department of Electrcal

More information

Research on Controller of Micro-hydro Power System Nan XIE 1,a, Dezhi QI 2,b,Weimin CHEN 2,c, Wei WANG 2,d

Research on Controller of Micro-hydro Power System Nan XIE 1,a, Dezhi QI 2,b,Weimin CHEN 2,c, Wei WANG 2,d Advanced Materals Research Submtted: 2014-05-13 ISSN: 1662-8985, Vols. 986-987, pp 1121-1124 Accepted: 2014-05-19 do:10.4028/www.scentfc.net/amr.986-987.1121 Onlne: 2014-07-18 2014 Trans Tech Publcatons,

More information

MEDICAL IMAGE WATERMARKING WITH PSNR OPTIMIZATION IN WAVELET DOMAIN BASED ON BAT ALGORITHM

MEDICAL IMAGE WATERMARKING WITH PSNR OPTIMIZATION IN WAVELET DOMAIN BASED ON BAT ALGORITHM Journal of Theoretcal and Appled Informaton Technology 2005-2015 JATIT & LLS. All rghts reserved. ISSN: 1992-8645 www.jatt.org E-ISSN: 1817-3195 MEDICAL IMAGE WATERMARKING WITH PSNR OPTIMIZATION IN WAVELET

More information

BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS

BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS Jonathan Me Carnege Mellon Unversty Department of Electrcal & Computer Engneerng Pttsburgh, PA 523 jme@cmu.edu Scott Pudlewsk Lncoln

More information

Multi-focus Image Fusion Using Spatial Frequency and Genetic Algorithm

Multi-focus Image Fusion Using Spatial Frequency and Genetic Algorithm 0 IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.8 No., February 008 Mult-focus Image Fuson Usng Spatal Frequency and Genetc Algorthm Jun Kong,, Kayuan Zheng,, Jngbo Zhang,,*,,

More information

熊本大学学術リポジトリ. Kumamoto University Repositor

熊本大学学術リポジトリ. Kumamoto University Repositor 熊本大学学術リポジトリ Kumamoto Unversty Repostor Ttle Wreless LAN Based Indoor Poston and Its Smulaton Author(s) Ktasuka, Teruak; Nakansh, Tsune CtatonIEEE Pacfc RIM Conference on Comm Computers, and Sgnal Processng

More information

A Novel DCT-based Approach for Secure Color Image Watermarking

A Novel DCT-based Approach for Secure Color Image Watermarking A Novel DCT-based Aroach for Secure Color Image Watermarkng Narges Ahmd Amrkabr Unversty of Technology n_ahmd@ce.aut.ac.r Reza Safabakhsh Amrkabr Unversty of Technology safa@ce.aut.ac.r Abstract In ths

More information

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of

More information

RESOURCE CONTROL FOR HYBRID CODE AND TIME DIVISION SCHEDULING

RESOURCE CONTROL FOR HYBRID CODE AND TIME DIVISION SCHEDULING RESOURCE CONTROL FOR HYBRID CODE AND TIME DIVISION SCHEDULING Vaslos A. Srs Insttute of Computer Scence (ICS), FORTH and Department of Computer Scence, Unversty of Crete P.O. Box 385, GR 7 Heraklon, Crete,

More information

communications are increasingly used in a way that they are scrambling and the combination of scrambling frequency and time domain.

communications are increasingly used in a way that they are scrambling and the combination of scrambling frequency and time domain. Journal of Advances n Computer Research Quarterly pissn: 2345-606x eissn: 2345-6078 Sar Branch, Islamc Azad Unversty, Sar, I.R.Iran (Vol. 7, No. 3, August 2016), Pages: 67-76 www.jacr.ausar.ac.r Audo Sgnal

More information

A New Type of Weighted DV-Hop Algorithm Based on Correction Factor in WSNs

A New Type of Weighted DV-Hop Algorithm Based on Correction Factor in WSNs Journal of Communcatons Vol. 9, No. 9, September 2014 A New Type of Weghted DV-Hop Algorthm Based on Correcton Factor n WSNs Yng Wang, Zhy Fang, and Ln Chen Department of Computer scence and technology,

More information

Fast Code Detection Using High Speed Time Delay Neural Networks

Fast Code Detection Using High Speed Time Delay Neural Networks Fast Code Detecton Usng Hgh Speed Tme Delay Neural Networks Hazem M. El-Bakry 1 and Nkos Mastoraks 1 Faculty of Computer Scence & Informaton Systems, Mansoura Unversty, Egypt helbakry0@yahoo.com Department

More information

THE ever increasing demand of industries to automate

THE ever increasing demand of industries to automate Massve Multple Access Based on Superposton Raptor Codes for M2M Communcatons Mahyar Shrvanmoghaddam, Member, IEEE, Mscha Dehler, Fello, IEEE, Sarah J. Johnson, Member, IEEE arxv:62.567v [cs.it] 8 Feb 26

More information

Keywords LTE, Uplink, Power Control, Fractional Power Control.

Keywords LTE, Uplink, Power Control, Fractional Power Control. Volume 3, Issue 6, June 2013 ISSN: 2277 128X Internatonal Journal of Advanced Research n Computer Scence and Software Engneerng Research Paper Avalable onlne at: www.jarcsse.com Uplnk Power Control Schemes

More information

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation 1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected

More information

An Efficient Secured Turbo Codes for Long Term Evolution System Enhancement

An Efficient Secured Turbo Codes for Long Term Evolution System Enhancement Internatonal ournal of Networks and Communcatons 2016, 6(3): 49-56 OI: 10.5923/j.jnc.20160603.02 An Effcent Secured Turbo Codes for Long Term Evoluton System Enhancement M. E. Abd El-Hameed 1, Mohsen A.

More information

Performance of WCDMA Downlink FDD Mode at 10 MHz Bandwidth

Performance of WCDMA Downlink FDD Mode at 10 MHz Bandwidth Performance of WCDA Downln FDD ode at 0 Hz Bandwdth Suyeb Ahmed han *, Jasvr Sngh **, ahmood an *** * Research Scholar,**Deptt. of Electroncs echnology, GND Unversty, Amrtsar, Inda ***Deptt. of Appled

More information

The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game

The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game 8 Y. B. LI, R. YAG, Y. LI, F. YE, THE SPECTRUM SHARIG I COGITIVE RADIO ETWORKS BASED O COMPETITIVE The Spectrum Sharng n Cogntve Rado etworks Based on Compettve Prce Game Y-bng LI, Ru YAG., Yun LI, Fang

More information

A New Statistical Detector for CT-Based Multiplicative Image Watermarking Using the t Location-Scale Distribution

A New Statistical Detector for CT-Based Multiplicative Image Watermarking Using the t Location-Scale Distribution 9th Internatonal Conference on Informaton and Knowledge Technology (IKT 07) October 8 & 9, 07, Amrkabr Unversty of Technology A ew Statstcal Detector for CT-Based Multplcatve Image Watermarkng Usng the

More information

Low-Delay 16 kb/s Wideband Speech Coder with Fast Search Methods

Low-Delay 16 kb/s Wideband Speech Coder with Fast Search Methods Low-Delay 16 b/s Wdeband Speech Coder wth Fast Search Methods M. HALIMI M. BENGHERABI A. KADDAI Speech Codng eam Centre de Développement des echnologes Avancées Haouch Oul BP. 17 Baba Hassen Algers ALGERIA

More information

In-system Jitter Measurement Based on Blind Oversampling Data Recovery

In-system Jitter Measurement Based on Blind Oversampling Data Recovery RADIOENGINEERING, VOL. 1, NO. 1, APRIL 01 403 In-system Jtter Measurement Based on Blnd Oversamplng Data Recovery Mchal KUBÍČEK, Zdeněk KOLKA Dept. of Rado Electroncs, Brno Unversty of Technology, Purkyňova

More information

Delay Constrained Fuzzy Rate Control for Video Streaming over DVB-H

Delay Constrained Fuzzy Rate Control for Video Streaming over DVB-H Delay Constraned Fuzzy Rate Control for Vdeo Streamng over DVB-H Mehd Rezae, Moncef Gabbouj, 3 med Bouazz,, Tampere Unversty of Technology, 3 Noka Research Center, Tampere, Fnland mehd.rezae@tut.f, moncef.gabbouj@tut.f,

More information

MIMO-OFDM Systems. Team Telecommunication and Computer Networks, FSSM, University Cadi Ayyad, P.O. Box 2390, Marrakech, Morocco.

MIMO-OFDM Systems. Team Telecommunication and Computer Networks, FSSM, University Cadi Ayyad, P.O. Box 2390, Marrakech, Morocco. IJCSI Internatonal Journal of Computer Scence Issues, Vol. 8, Issue 3, ay 2011 ISSN (Onlne: 1694-0814 A Low-complexty Power and Bt Allocaton Algorthm for ultuser IO-OFD Systems Ayad Habb 1, Khald El Baamran

More information

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty

More information

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,

More information

Multiple Error Correction Using Reduced Precision Redundancy Technique

Multiple Error Correction Using Reduced Precision Redundancy Technique Multple Error Correcton Usng Reduced Precson Redundancy Technque Chthra V 1, Nthka Bhas 2, Janeera D A 3 1,2,3 ECE Department, Dhanalakshm Srnvasan College of Engneerng,Combatore, Tamlnadu, Inda Abstract

More information

A Current Differential Line Protection Using a Synchronous Reference Frame Approach

A Current Differential Line Protection Using a Synchronous Reference Frame Approach A Current Dfferental Lne rotecton Usng a Synchronous Reference Frame Approach L. Sousa Martns *, Carlos Fortunato *, and V.Fernão res * * Escola Sup. Tecnologa Setúbal / Inst. oltécnco Setúbal, Setúbal,

More information

Enhanced Uplink Scheduling for Continuous Connectivity in High Speed Packet Access Systems

Enhanced Uplink Scheduling for Continuous Connectivity in High Speed Packet Access Systems Int. J. Communcatons, Network and System Scences, 212, 5, 446-453 http://dx.do.org/1.4236/jcns.212.5855 Publshed Onlne August 212 (http://www.scrp.org/journal/jcns) Enhanced Uplnk Schedulng for Contnuous

More information

A Robust Feature Extraction Algorithm for Audio Fingerprinting

A Robust Feature Extraction Algorithm for Audio Fingerprinting A Robust Feature Extracton Algorthm for Audo Fngerprntng Janpng Chen 1, Tejun Huang 2 1 Insttute of Computng Technology, Chnese Academy of Scences, Bejng 100190, Chna 2 Key Laboratory of Machne Percepton(Mnstry

More information

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University Dynamc Optmzaton Assgnment 1 Sasanka Nagavall snagaval@andrew.cmu.edu 16-745 January 29, 213 Robotcs Insttute Carnege Mellon Unversty Table of Contents 1. Problem and Approach... 1 2. Optmzaton wthout

More information

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES IEE Electroncs Letters, vol 34, no 17, August 1998, pp. 1622-1624. ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES A. Chatzgeorgou, S. Nkolads 1 and I. Tsoukalas Computer Scence Department, 1 Department

More information

Low Switching Frequency Active Harmonic Elimination in Multilevel Converters with Unequal DC Voltages

Low Switching Frequency Active Harmonic Elimination in Multilevel Converters with Unequal DC Voltages Low Swtchng Frequency Actve Harmonc Elmnaton n Multlevel Converters wth Unequal DC Voltages Zhong Du,, Leon M. Tolbert, John N. Chasson, Hu L The Unversty of Tennessee Electrcal and Computer Engneerng

More information

Performance Analysis of Power Line Communication Using DS-CDMA Technique with Adaptive Laguerre Filters

Performance Analysis of Power Line Communication Using DS-CDMA Technique with Adaptive Laguerre Filters Internatonal Conference on Informaton and Electroncs Engneerng IPCSIT vol.6 ( ( IACSIT Press, Sngapore Performance Analyss of Power Lne Communcaton Usng DS-CDMA Technque wth Adaptve Laguerre Flters S.

More information

Topology Control for C-RAN Architecture Based on Complex Network

Topology Control for C-RAN Architecture Based on Complex Network Topology Control for C-RAN Archtecture Based on Complex Network Zhanun Lu, Yung He, Yunpeng L, Zhaoy L, Ka Dng Chongqng key laboratory of moble communcatons technology Chongqng unversty of post and telecommuncaton

More information

Error Probability of RS Code Over Wireless Channel

Error Probability of RS Code Over Wireless Channel Internatonal Journal of Electroncs Engneerng, 3 (), 11, pp. 99 33 Serals Publcatons, ISS : 973-7383 Error Probablty of RS Code Over Wreless Channel Mohammad Aftab Alam Khan 1 & Mehwash Farooq 1 1 Department

More information

International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January SYSTEL, SUPCOM, Tunisia.

International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January SYSTEL, SUPCOM, Tunisia. Internatonal Journal of Network Securty & Its Applcaton (IJNSA), Vol.2, No., January 2 WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES Omessaad Hamd, Manel abdelhed 2, Ammar Bouallegue 2,

More information

AN ALGORITHM TO COMBINE LINK ADAPTATION AND TRANSMIT POWER CONTROL IN HIPERLAN TYPE 2

AN ALGORITHM TO COMBINE LINK ADAPTATION AND TRANSMIT POWER CONTROL IN HIPERLAN TYPE 2 AN ALGORITHM TO COMBINE LINK ADAPTATION AND TRANSMIT POWER CONTROL IN HIPERLAN TYPE 2 Markus Radmrsch Inst. f. Allgem. Nachrchtentechnk, Unv. Hannover, Appelstr. 9a, 3167 Hannover, Germany Tel.: +49-511-762

More information

Combination of 2D chaotic Encryption and Turbo Coding for Secure Image Transmission

Combination of 2D chaotic Encryption and Turbo Coding for Secure Image Transmission IJCSS Internatonal Journal of Computer Scence and etwor Securty, VOL.0 o., ovember 00 79 Combnaton of D chaotc Encrypton and Turbo Codng for Secure Image Transmsson M. A. El-Isandaran, Saad M. Darwsh,

More information

Hardware Design of Filter Bank-Based Narrowband/Wideband Interference Canceler for Overlaid TDMA/CDMA Systems

Hardware Design of Filter Bank-Based Narrowband/Wideband Interference Canceler for Overlaid TDMA/CDMA Systems Hardware Desgn of Flter anased arrowband/deband Interference Canceler for Overlad TDMA/CDMA Systems Toyoau Ktano Kaunor Hayash Htosh Masutan and Shnsue Hara Graduate School of Engneerng Osaa Unversty YamadaOa

More information

Modeling Hierarchical Event Streams in System Level Performance Analysis

Modeling Hierarchical Event Streams in System Level Performance Analysis Modelng Herarchcal Event Streams n System Level Performance Analyss IK Report 9 obas Ren, Ka Lampka, Lothar hele Computer Engneerng and Networks Laboratory Swss Federal Instsute of echnology (EH) Zurch,

More information

arxiv: v1 [cs.it] 30 Sep 2008

arxiv: v1 [cs.it] 30 Sep 2008 A CODED BIT-LOADING LINEAR PRECODED DISCRETE MULTITONE SOLUTION FOR POWER LINE COMMUNICATION Fahad Syed Muhammmad*, Jean-Yves Baudas, Jean-Franços Hélard, and Mattheu Crussère Insttute of Electroncs and

More information

Relevance of Energy Efficiency Gain in Massive MIMO Wireless Network

Relevance of Energy Efficiency Gain in Massive MIMO Wireless Network Relevance of Energy Effcency Gan n Massve MIMO Wreless Network Ahmed Alzahran, Vjey Thayananthan, Muhammad Shuab Quresh Computer Scence Department, Faculty of Computng and Informaton Technology Kng Abdulazz

More information

FPGA Implementation of Ultrasonic S-Scan Coordinate Conversion Based on Radix-4 CORDIC Algorithm

FPGA Implementation of Ultrasonic S-Scan Coordinate Conversion Based on Radix-4 CORDIC Algorithm IACSIT Internatonal Journal of Engneerng and Technology, Vol. 7, No. 3, June 25 FPGA Implementaton of Ultrasonc S-Scan Coordnate Converson Based on Radx-4 CORDIC Algorthm Ruobo Ln, Guxong Lu, and Wenmng

More information

An Improved Method for GPS-based Network Position Location in Forests 1

An Improved Method for GPS-based Network Position Location in Forests 1 Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the WCNC 008 proceedngs. An Improved Method for GPS-based Network Poston Locaton n

More information

Modeling and Simulation of New Encoding Schemes for High-Speed UHF RFID Communication

Modeling and Simulation of New Encoding Schemes for High-Speed UHF RFID Communication Modelng and Smulaton of New Encodng Schemes for Hgh-Speed UHF RFID Communcaton Sang-Hyun Mo, J-Hoon Bae, Chan-Won Park, Hyo-Chan Bang, and Hyung Chul Park In ths paper, we present novel hgh-speed transmsson

More information

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985 NATONAL RADO ASTRONOMY OBSERVATORY Green Bank, West Vrgna SPECTRAL PROCESSOR MEMO NO. 25 MEMORANDUM February 13, 1985 To: Spectral Processor Group From: R. Fsher Subj: Some Experments wth an nteger FFT

More information

Multi-hop Coordination in Gossiping-based Wireless Sensor Networks

Multi-hop Coordination in Gossiping-based Wireless Sensor Networks Mult-hop Coordnaton n Gosspng-based Wreless Sensor Networks Zhlang Chen, Alexander Kuehne, and Anja Klen Communcatons Engneerng Lab, Technsche Unverstät Darmstadt, Germany Emal: {z.chen,a.kuehne,a.klen}@nt.tu-darmstadt.de

More information

Robust Filter Design based on Generalized Maximum-Likelihood Estimation

Robust Filter Design based on Generalized Maximum-Likelihood Estimation Robust Flter Desgn based on Generalzed Maxmum-Lkelhood Estmaton STEFA LEISCHER, ROBERT KLISKI, HOLGER HUTZELMA, RUDI KORR Fraunhofer Insttute for Communcaton Systems Hansastr. 3, 8686 Munch GERMAY Abstract:

More information

Diversion of Constant Crossover Rate DE\BBO to Variable Crossover Rate DE\BBO\L

Diversion of Constant Crossover Rate DE\BBO to Variable Crossover Rate DE\BBO\L , pp. 207-220 http://dx.do.org/10.14257/jht.2016.9.1.18 Dverson of Constant Crossover Rate DE\BBO to Varable Crossover Rate DE\BBO\L Ekta 1, Mandeep Kaur 2 1 Department of Computer Scence, GNDU, RC, Jalandhar

More information

New Wavelet Based Performance Analysis and Optimization of Scalable Joint Source/Channel Coder (SJSCC & SJSCCN) for Time-Varying Channels.

New Wavelet Based Performance Analysis and Optimization of Scalable Joint Source/Channel Coder (SJSCC & SJSCCN) for Time-Varying Channels. Internatonal Research Journal of Engneerng and Technology (IRJET) e-issn: 2395-0056 Volume: 02 Issue: 09 DEC-205 p-issn: 2395-0072 www.rjet.net New Wavelet Based Performance Analyss and Optmzaton of Scalable

More information

A Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web

A Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web A Dgtal Content Dstrbuton Usng a Group-Key and Mult-layered Structure Based on Web Yun-J Na and Il Seo Ko 2 Department of Internet Software, Honam Unversty 59-, Seobong-Dong, Gwangsan-Gu, Gwangju 506-74,

More information

Resource Control for Elastic Traffic in CDMA Networks

Resource Control for Elastic Traffic in CDMA Networks Resource Control for Elastc Traffc n CDMA Networks Vaslos A. Srs Insttute of Computer Scence, FORTH Crete, Greece vsrs@cs.forth.gr ACM MobCom 2002 Sep. 23-28, 2002, Atlanta, U.S.A. Funded n part by BTexact

More information

Study of Downlink Radio Resource Allocation Scheme with Interference Coordination in LTE A Network

Study of Downlink Radio Resource Allocation Scheme with Interference Coordination in LTE A Network Internatonal Journal of Future Computer and Communcaton, Vol. 6, o. 3, September 2017 Study of Downln Rado Resource Allocaton Scheme wth Interference Coordnaton n LTE A etwor Yen-Wen Chen and Chen-Ju Chen

More information