Pseudo Noise Sequence Generation using Elliptic Curve for CDMA and Security Application

Size: px
Start display at page:

Download "Pseudo Noise Sequence Generation using Elliptic Curve for CDMA and Security Application"

Transcription

1 IJIRST International Journal for Innovative Research in Science & Technology Volume 1 Issue 11 April 2015 ISSN (online): Pseudo Noise Sequence Generation using Elliptic Curve for CDMA and Security Application Nivedita Singh BE Student Barkha Shrivastava BE Student Payal Dwivedi BE Student Manoj Kumar Assistant Professor Abstract Spread spectrum communication is a new theory and modulation technique and different from the conventional communication system. A good correlation property and large linear period of Pseudo-random sequence is the basis of spread spectrum communication systems intern CDMA (code division multiple access communication systems). In this paper PN (pseudo noise) sequence/ code which is referred as the high rate digital code is generated on MATLAB by use of cyclic elliptic curve. This paper presents an investigation on use of Genetic Algorithm (GA) for the purpose of encryption of audio and video input. A pseudo random sequences, is use in various applications like CDMA, image protection, speech security, watermark etc. The most commonly used sequences in direct sequence spread spectrum systems are maximal length codes, gold codes and barker codes. The sequence offers a variety of correlation properties like auto and cross correlation, sensitivity, key space etc. Based on a measure described in this, the correlation properties of sets of these sequences are compared to well-known sequence sets and after comparing it we can apply it in various applications. Keywords: Pseudo Noise sequence, Spread Spectrum, Code Division Multiple Access, Genetic Algorithm, Elliptic Curves I. INTRODUCTION Pseudo random binary sequences (PRBSs), also known as pseudo noise (F ), linear feedback shift register (LFSR) sequences or maximal length binary sequences (m sequences),are widely used in digital communications. In a truly random sequence the bit pattern never repeats. Pseudo-Noise (PN) sequences whose terms depend in a simple manner on their predecessors. Such sequences are easily generated by recursive procedures. PN sequences that are useful for speech encryption must have very good auto-correlation and cross-correlation properties as well as maintaining some randomness properties. The security offered by the system depends on the randomness of PN sequence. Pn-sequences generated by the use of elliptic curves have more randomness and thus, it behaves more like a noise, therefore difficult to detect. The objective of the paper is to generate PN sequence using elliptic curve and to test the properties of each generated PN sequence and compare the performance with the standard codes. This paper presents an investigation on use of GA for the purpose of encryption of audio and video input and followed by modulation based DSSS-CDMA technique. II. METHODOLOGY A pseudo random binary sequence is a semi-random sequence in the sense that it appears random within the sequence length, fulfilling the needs of randomness, but the entire sequence repeats indefinitely. To a casual observer the sequence appears totally random, however to a user who is aware of the way the sequence is generated all its properties are known. PN sequences have several interesting properties, which are exploited in a variety of applications. Because of their good autocorrelation two similar PN sequences can easily be phase synchronised, even when one of them is corrupted by noise. A PN sequence is an ideal test signal, as it simulates the random Characteristics of a digital signal and can be easily generated. An elliptic curve is a plane curve defined by an equation of the form y^2=x^3+ax+b All rights reserved by 222

2 Curves of this nature are called ELLIPTIC CURVES Consider the field F, defined by using polynomial representation with the irreducible polynomial f(x) = x 4 + x + 1. The element g = (0010) is a generator for the field. The powers of g are: g 0 = (0001) g 1 = (0010) g 2 = (0100) g 3 = (1000) g 4 = (0011) g 5 = (0110) g 6 = (1100) g 7 = (1011) g 8 = (0101) g 9 = (1010) g 10 = (0111) g 11 = (1110) g 12 = (1111) g 13 = (1101) g 14 = (1001) g 15 = (0001) Using generator notation allows multiplication without reference to the irreducible polynomial f(x)=x 4 +x+1. Consider the elliptic curve y 2 + xy = x 3 + g 4 x Here a = g 4 and b = g 0 =1. The point (g 5, g 3 ) satisfies this equation over F 2 m: y 2 +xy=x 3 +g 4 x 2 +1 (g 3 ) 2 +g 5 g 3 =(g 5 ) 3 +g 4 g g 6 +g 8 =g 15 +g (1100)+(0101)=(0001)+(1001)+(0001) (1001)=(1001) The fifteen points which satisfy this equation are: (1, g 13 ) (g 3, g 13 ) (g 5, g 11 ) (g 6, g 14 ) (g 9, g 13 ) (g 10, g 8 ) (g 12, g 12 ) (1, g 6 ) (g 3, g 8 ) (g 5, g 3 ) (g 6, g 8 ) (g 9, g 10 ) (g 10, g) (g 12, 0) (0, 1) Trace Function: The trace values of individual points lying on the field is calculated by xoring every point with trace function so obtained. Then the points form a unique pn-sequence by interleaving the x-coordinates & y-coordinates of each point as shown GENETIC ALGORITHM FOR ENCRYPTION Tx Antenna INPUT DATA (decimal to binary) XOR OPERA-TION PN- SEQUE NCE CROSS- OVER MUTA- TION MODU- LATION CARRIE R SIGNAL Fig. 1: Transmitter Section All rights reserved by 223

3 GENETIC ALGORITHM Rx Antenna FOR DECRYPTION DEMODU- LATION DMUTA - TION REVERS E CROSS- OVER XOR OPER A- TION OUTPUT DATA (binary to Decimal) CARRIER SIGNAL PN- SEQUEN CE Fig. 2: Receiver Section The GA is a stochastic global search method that mimics the metaphor of natural biological evolution. A genetic algorithm (or short GA) is a search technique used in computing to find true or approximate solutions to optimization and search problems. Genetic algorithms are categorized as global search heuristics. Genetic algorithms are a particular class of evolutionary algorithms that use techniques inspired by evolutionary biology such as inheritance, mutation, selection, and recombination. Genetic algorithms (GAs) can be applied to any process control application for optimization of different parameters. Genetic algorithms (GAs) use various operators viz. the crossover, mutation for the proper selection of optimized value. Selection of proper crossover and mutation technique depends upon the encoding method and as per the requirement of the problem. A. Crossover: It is the process in which genes are selected from the parent chromosomes and new offspring is created. Crossover can be performed with binary encoding, permutation encoding, value encoding and tree encoding. B. Binary Encoding Crossover: In binary encoding, the chromosomes may crossover at single point, two points, uniformly or arithmetically. In single point crossover, a single crossover point is chosen and the data before this point are exactly copied from first parent and the data after this point are exactly copied from the second parent to create new off springs. Two parents in this method give two new off springs. Before Crossover after Crossover Fig. 3: Binary encoding crossover C. Mutation: Premature convergence is a critical problem in most optimization techniques, consisting of populations, which occurs when highly fit parent chromosomes in the population breed many similar off springs in early evolution time. Crossover operation of genetic algorithms (GAs) cannot generate quite different off springs from their parents because the acquired information is used to crossover the chromosomes. An alternate operator, mutation, can search new areas in contrast to the crossover. Crossover is referred as exploitation operator whereas the mutation is exploration one. Like crossover, mutation can also be performed for all types of encoding techniques. D. Binary Encoding Mutation: In binary encoding mutation, the bits selected for creating new offsprings are inverted. In binary encoding mutation, if the bit 1 is converted into bit 0, it decreases the numerical value of the chromosome, and is known as down mutation. Similarly, if the bit 0 is converted into bit 1, the numerical value of the chromosome increases and is referred as up mutation. All rights reserved by 224

4 Before Mutation after Mutation Fig. 4: Binary encoding mutation III. RESULT AND DISCUSSION Fig. 5: The 32 bit p-n sequence generated using the elliptic curve1 is In this audio signal, there are total samples. Some of the encrypted sample values are:- 30 th sample: st sample: nd sample: Fig. 6: Encrypted Samples of Audio Signal All rights reserved by 225

5 IV. O/P WAVEFORMS OF AUDIO INPUT APPLICATION Fig. 7: O/P Waveforms of Audio Input Application In application part, the audio signal is encrypted using the pseudo random sequence generated by elliptic curve method. The pseudo random sequence so generated is of thirty two bits, out of which only sixteen bits have been considered. For encryption of audio signal, firstly it has been converted to digital samples. Then genetic algorithm has been applied to these digital samples and the pseudo random sequence for obtaining the encrypted sample values. The genetic algorithm has two main operators that is crossover and mutation. Firstly, the sample values are XOR-ed with the generated pn-sequence. Then crossover operation is performed considering the two consecutive sample values at a time and are finally mutated. In this way all the digital samples are encrypted. Now the encrypted samples are modulated using pn-sequence based on the principle of DSSS. These modulated samples are thus received at the receiver end; where the demodulation and decryption operation is performed. The above operation is the simplest type of CODE DIVISION MULTIPLE ACCESS. The pseudo random sequence which is used; is generated using elliptic curve because it will provide maximum randomness to the sequence and also because of its computational complexity. For its generation; an elliptic curve has been selected and the galois field is chosen. The galois coefficients are calculated such that they satisfy the galois field. Then the trace function is calculated. The roots of the elliptic curve are computed which will be in the form of galois coefficients ;they are xored with trace function and finally trace value is calculated to obtain single bit x, y coordinates. These x, y coordinates are then interleaved to form the pseudo random sequence. This computational complexity will provide sufficient randomness to the sequence thus making it look like a noise; thereby providing high security against unauthorised access. V. CONCLUSIONS AND FUTURE SCOPE In this paper we have provided simple and comprehensive technique for generation of Pn sequences which can be used for purposes like echo hiding, spread spectrum modulation and watermarking. A. Echo Hiding: It is a method of audio watermarking. It is based on the fact that one cannot perceive short echoes of the order of a millisecond. Echo hiding embeds data into a cover audio signal. To encode ones and zeros, two types of echoes with different delays are used. Thus, an arbitrary sequence of ones and zeros can be embedded. B. Spread Spectrum Modulation: It is a digital radio frequency modulation technique. This modulation method is immune to interference and interception. Here, a given binary signal sequence is multiplied with other PN sequences to spread the signal over a much larger frequency band. The resulting signal is much below the noise floor. At the receiver, correlation receiver/matched filter is used to recover the original binary signal sequence. The precise detection requires the original PN sequence also. By using difference PN sequences for spreading difference binary signal sequence, it is possible to send multiple signal sequence simultaneously, over a given frequency band. All rights reserved by 226

6 C. Watermarking: Watermarking is also a sub-discipline of information hiding. Watermarking secures the content. Thus, any attempt to modify the content can be easily detected.it is the process of embedding secret and robust identifiers inside audio-visual content.to overcome the limitations in watermarking due to methods like LSB substitution and to make the system more robust against attacks, the watermark can be spread across the cover object by using more number of bits than the minimum required.this scheme of hiding the data uses the concepts of code division multiple access(cdma).this technique ensures the survival of watermark under various attacks due to redundancy. Each of the data bits is represented by using a large number of bits out of which a significant portion may be lost without totally losing the watermark information. D. Watermarking Using PN Sequences: Psuedonoise sequences are used for watermarking because of their very good correlation properties, noise like characteristics and resistance to interference.each data bit of the watermark is represented by a large number of bits, out of which a significant portion may be lost without losing the watermark thoroughly.this method ensures the survival of watermark because of redundancy.a general method that is followed for watermarking using PN sequences is embedding a PN sequences into the data where every PN sequence represents one bit of watermarking information. For the watermark extraction the sequence of marked bits are correlated with known PN sequence. A pseudorandom noise (PN) sequence is a sequence of binary numbers, which appears to be random, but is in fact perfectly deterministic. The sequence appears to be random in the sense that the binary values and groups or runs of the same binary value occur in the sequence in the same proportion. Pseudo Noise Sequence (PN Sequence) is also known as maximum length sequence. It has properties of a random binary sequence.pn sequence is a periodic binary sequence. It is generated by an n-bit linear feedback shift register. Its bit duration is fraction of information bit duration. PN sequence is used as spreading sequence in spread spectrum transmitter. Different PN sequences can be generated by feeding in different n-bit initial sequence. The CDMA technique is a spread spectrum technique, that spreads the transmitted or the narrowband message over a wide frequency band, which is much wider than the actual minimum bandwidth required and this large bandwidth signal is called as the spreading signal. One method of widening the bandwidth is by use of modulation. Pseudorandom sequences or the PN sequences are used as the spreading sequences. REFERENCES [1] Ahmad A, Al-Busaidi S S et al. (2013). Study on cyclic cross-correlation behavior of maximal length pseudo-random binary sequences, Indian Journal of Industrial and Applied Mathematics (Taylor & Francis), vol 4(1) [2] Ahmad A (2012). Better PN generators for CDMA application, a Verilog-HDL implementation approach, International Journal of Information Engineering (IJIE), vol 2(1), [3] Golomb S W (1982). Shift Register Sequences, Aegean Park Press, Revised Edition. [4] S. V. Sathyanarayana(2012). Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence Elliptic Curve of Cyclic, International Journal of Network Security, Vol.12, No.3, PP.137(150) [5] Pal, M. Chattopadhyay(2010). A novel orthogonal mini mum cross-correlation spreading code in CDMA system Emerging Trends in Robotics and Communication Technologies (INTERACT), 2010 International Conference on Digital Object, 2010, pp [6] Abhijit Mitra (2008). On the Properties of Pseudo Noise Sequences with a Simple Proposal of Randomness Test, International Journal of Electrical and Computer Engineering 3:3. All rights reserved by 227

Cross Spectral Density Analysis for Various Codes Suitable for Spread Spectrum under AWGN conditions with Error Detecting Code

Cross Spectral Density Analysis for Various Codes Suitable for Spread Spectrum under AWGN conditions with Error Detecting Code Cross Spectral Density Analysis for Various Codes Suitable for Spread Spectrum under AWG conditions with Error Detecting Code CH.ISHATHI 1, R.SUDAR RAJA 2 Department of Electronics and Communication Engineering,

More information

CHAPTER 2. Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication ( )

CHAPTER 2. Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication ( ) CHAPTER 2 Instructor: Mr. Abhijit Parmar Course: Mobile Computing and Wireless Communication (2170710) Syllabus Chapter-2.4 Spread Spectrum Spread Spectrum SS was developed initially for military and intelligence

More information

Spread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access

Spread Spectrum. Chapter 18. FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access Spread Spectrum Chapter 18 FHSS Frequency Hopping Spread Spectrum DSSS Direct Sequence Spread Spectrum DSSS using CDMA Code Division Multiple Access Single Carrier The traditional way Transmitted signal

More information

Digital Image Watermarking by Spread Spectrum method

Digital Image Watermarking by Spread Spectrum method Digital Image Watermarking by Spread Spectrum method Andreja Samčovi ović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Belgrade, november 2014. I Spread Spectrum Techniques

More information

Chaos based Communication System Using Reed Solomon (RS) Coding for AWGN & Rayleigh Fading Channels

Chaos based Communication System Using Reed Solomon (RS) Coding for AWGN & Rayleigh Fading Channels 2015 IJSRSET Volume 1 Issue 1 Print ISSN : 2395-1990 Online ISSN : 2394-4099 Themed Section: Engineering and Technology Chaos based Communication System Using Reed Solomon (RS) Coding for AWGN & Rayleigh

More information

ECS455: Chapter 4 Multiple Access

ECS455: Chapter 4 Multiple Access ECS455: Chapter 4 Multiple Access 4.4 DS/SS 1 Dr.Prapun Suksompong prapun.com/ecs455 Office Hours: BKD 3601-7 Wednesday 15:30-16:30 Friday 9:30-10:30 Spread spectrum (SS) Historically spread spectrum was

More information

Code Division Multiple Access.

Code Division Multiple Access. Code Division Multiple Access Mobile telephony, using the concept of cellular architecture, are built based on GSM (Global System for Mobile communication) and IS-95(Intermediate Standard-95). CDMA allows

More information

Implementation of DSSS System using Chaotic Sequence using MATLAB and VHDL

Implementation of DSSS System using Chaotic Sequence using MATLAB and VHDL Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.598

More information

Spread Spectrum Techniques

Spread Spectrum Techniques 0 Spread Spectrum Techniques Contents 1 1. Overview 2. Pseudonoise Sequences 3. Direct Sequence Spread Spectrum Systems 4. Frequency Hopping Systems 5. Synchronization 6. Applications 2 1. Overview Basic

More information

Lecture 3. Direct Sequence Spread Spectrum Systems. COMM 907:Spread Spectrum Communications

Lecture 3. Direct Sequence Spread Spectrum Systems. COMM 907:Spread Spectrum Communications COMM 907: Spread Spectrum Communications Lecture 3 Direct Sequence Spread Spectrum Systems Performance of DSSSS with BPSK Modulation in presence of Interference (Jamming) Broadband Interference (Jamming):

More information

Chapter 5 OPTIMIZATION OF BOW TIE ANTENNA USING GENETIC ALGORITHM

Chapter 5 OPTIMIZATION OF BOW TIE ANTENNA USING GENETIC ALGORITHM Chapter 5 OPTIMIZATION OF BOW TIE ANTENNA USING GENETIC ALGORITHM 5.1 Introduction This chapter focuses on the use of an optimization technique known as genetic algorithm to optimize the dimensions of

More information

Noise Effective Code Analysis on the Basis of Correlation in CDMA Technology

Noise Effective Code Analysis on the Basis of Correlation in CDMA Technology Manarat International University Studies, 2 (1): 183-191, December 2011 ISSN 1815-6754 @ Manarat International University, 2011 Noise Effective Code Analysis on the Basis of Correlation in CDMA Technology

More information

CDMA Technology : Pr. S. Flament Pr. Dr. W. Skupin On line Course on CDMA Technology

CDMA Technology : Pr. S. Flament  Pr. Dr. W. Skupin  On line Course on CDMA Technology CDMA Technology : Pr. Dr. W. Skupin www.htwg-konstanz.de Pr. S. Flament www.greyc.fr/user/99 On line Course on CDMA Technology CDMA Technology : Introduction to Spread Spectrum Technology CDMA / DS : Principle

More information

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013

ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013 ECE 5325/6325: Wireless Communication Systems Lecture Notes, Spring 2013 Lecture 17 Today: Spread Spectrum: (1) Frequency Hopping, (2) Direct Sequence Reading: Today Molisch 18.1, 18.2. Thu: MUSE Channel

More information

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization.

Simple Algorithm in (older) Selection Diversity. Receiver Diversity Can we Do Better? Receiver Diversity Optimization. 18-452/18-750 Wireless Networks and Applications Lecture 6: Physical Layer Diversity and Coding Peter Steenkiste Carnegie Mellon University Spring Semester 2017 http://www.cs.cmu.edu/~prs/wirelesss17/

More information

An Improved VLSI Architecture Using Galois Sequence for High Speed DSSS Signal Acquisition at Low SNR

An Improved VLSI Architecture Using Galois Sequence for High Speed DSSS Signal Acquisition at Low SNR International Journal of Engineering Inventions ISSN: 2278-7461, www.ijeijournal.com Volume 1, Issue 9 (November2012) PP: 42-48 An Improved VLSI Architecture Using Galois Sequence for High Speed DSSS Signal

More information

CDMA Example with MATLAB

CDMA Example with MATLAB CDMA Example with MATLAB Firstly we generate a small random sequence of binary data, that we represent as a sampled waveform with 64 samples per bit. % CDMA example clear all data = randint(1,15,2); for

More information

Lecture 9: Spread Spectrum Modulation Techniques

Lecture 9: Spread Spectrum Modulation Techniques Lecture 9: Spread Spectrum Modulation Techniques Spread spectrum (SS) modulation techniques employ a transmission bandwidth which is several orders of magnitude greater than the minimum required bandwidth

More information

Digi-Wave Technology Williams Sound Digi-Wave White Paper

Digi-Wave Technology Williams Sound Digi-Wave White Paper Digi-Wave Technology Williams Sound Digi-Wave White Paper TECHNICAL DESCRIPTION Operating Frequency: The Digi-Wave System operates on the 2.4 GHz Industrial, Scientific, and Medical (ISM) Band, which is

More information

Chapter 2 Direct-Sequence Systems

Chapter 2 Direct-Sequence Systems Chapter 2 Direct-Sequence Systems A spread-spectrum signal is one with an extra modulation that expands the signal bandwidth greatly beyond what is required by the underlying coded-data modulation. Spread-spectrum

More information

Spreading Codes and Characteristics. Error Correction Codes

Spreading Codes and Characteristics. Error Correction Codes Spreading Codes and Characteristics and Error Correction Codes Global Navigational Satellite Systems (GNSS-6) Short course, NERTU Prasad Krishnan International Institute of Information Technology, Hyderabad

More information

Performance Evaluation of different α value for OFDM System

Performance Evaluation of different α value for OFDM System Performance Evaluation of different α value for OFDM System Dr. K.Elangovan Dept. of Computer Science & Engineering Bharathidasan University richirappalli Abstract: Orthogonal Frequency Division Multiplexing

More information

Spread Spectrum Communications and Jamming Prof. Kutty Shajahan M G S Sanyal School of Telecommunications Indian Institute of Technology, Kharagpur

Spread Spectrum Communications and Jamming Prof. Kutty Shajahan M G S Sanyal School of Telecommunications Indian Institute of Technology, Kharagpur Spread Spectrum Communications and Jamming Prof. Kutty Shajahan M G S Sanyal School of Telecommunications Indian Institute of Technology, Kharagpur Lecture - 06 Tutorial I Hello friends, welcome to this

More information

Performance Analysis of DSSS and FHSS Techniques over AWGN Channel

Performance Analysis of DSSS and FHSS Techniques over AWGN Channel Performance Analysis of DSSS and FHSS Techniques over AWGN Channel M. Katta Swamy, M.Deepthi, V.Mounika, R.N.Saranya Vignana Bharathi Institute of Technology, Hyderabad, and Andhra Pradesh, India. Corresponding

More information

Implementation of Reed-Solomon RS(255,239) Code

Implementation of Reed-Solomon RS(255,239) Code Implementation of Reed-Solomon RS(255,239) Code Maja Malenko SS. Cyril and Methodius University - Faculty of Electrical Engineering and Information Technologies Karpos II bb, PO Box 574, 1000 Skopje, Macedonia

More information

Laboratory 5: Spread Spectrum Communications

Laboratory 5: Spread Spectrum Communications Laboratory 5: Spread Spectrum Communications Cory J. Prust, Ph.D. Electrical Engineering and Computer Science Department Milwaukee School of Engineering Last Update: 19 September 2018 Contents 0 Laboratory

More information

Spread Spectrum (SS) is a means of transmission in which the signal occupies a

Spread Spectrum (SS) is a means of transmission in which the signal occupies a SPREAD-SPECTRUM SPECTRUM TECHNIQUES: A BRIEF OVERVIEW SS: AN OVERVIEW Spread Spectrum (SS) is a means of transmission in which the signal occupies a bandwidth in excess of the minimum necessary to send

More information

OFDM Based Low Power Secured Communication using AES with Vedic Mathematics Technique for Military Applications

OFDM Based Low Power Secured Communication using AES with Vedic Mathematics Technique for Military Applications OFDM Based Low Power Secured Communication using AES with Vedic Mathematics Technique for Military Applications Elakkiya.V 1, Sharmila.S 2, Swathi Priya A.S 3, Vinodha.K 4 1,2,3,4 Department of Electronics

More information

PERFORMANCE EVALUATION OF DIRECT SEQUENCE SPREAD SPECTRUM UNDER PHASE NOISE EFFECT WITH SIMULINK SIMULATIONS

PERFORMANCE EVALUATION OF DIRECT SEQUENCE SPREAD SPECTRUM UNDER PHASE NOISE EFFECT WITH SIMULINK SIMULATIONS PERFORMANCE EVALUATION OF DIRECT SEQUENCE SPREAD SPECTRUM UNDER PHASE NOISE EFFECT WITH SIMULINK SIMULATIONS Rupender Singh 1, Dr. S.K. Soni 2 1,2 Department of Electronics & Communication Engineering,

More information

Part A: Spread Spectrum Systems

Part A: Spread Spectrum Systems 1 Telecommunication Systems and Applications (TL - 424) Part A: Spread Spectrum Systems Dr. ir. Muhammad Nasir KHAN Department of Electrical Engineering Swedish College of Engineering and Technology March

More information

Generation and implementation of Pseudorandom codes for Navigation System in FPGA

Generation and implementation of Pseudorandom codes for Navigation System in FPGA Generation and implementation of Pseudorandom codes for Navigation System in FPGA Akash B #1, Dileep D *2, Yashodha H #3 # Reva Institute of Technology & Management (RITM), Visvesvaraya Technological University(VTU)

More information

Generation of Orthogonal Logistic Map Sequences for Application in Wireless Channel and Implementation using a Multiplierless Technique

Generation of Orthogonal Logistic Map Sequences for Application in Wireless Channel and Implementation using a Multiplierless Technique Generation of Orthogonal Logistic Map Sequences for Application in Wireless Channel and Implementation using a Multiplierless Technique KATYAYANI KASHYAP 1, MANASH PRATIM SARMA 1, KANDARPA KUMAR SARMA

More information

UNIT 4 Spread Spectrum and Multiple. Access Technique

UNIT 4 Spread Spectrum and Multiple. Access Technique UNIT 4 Spread Spectrum and Multiple Access Technique Spread Spectrum lspread spectrumis a communication technique that spreads a narrowband communication signal over a wide range of frequencies for transmission

More information

A Review on Genetic Algorithm and Its Applications

A Review on Genetic Algorithm and Its Applications 2017 IJSRST Volume 3 Issue 8 Print ISSN: 2395-6011 Online ISSN: 2395-602X Themed Section: Science and Technology A Review on Genetic Algorithm and Its Applications Anju Bala Research Scholar, Department

More information

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers

Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers Digital Audio Watermarking With Discrete Wavelet Transform Using Fibonacci Numbers P. Mohan Kumar 1, Dr. M. Sailaja 2 M. Tech scholar, Dept. of E.C.E, Jawaharlal Nehru Technological University Kakinada,

More information

Total Harmonic Distortion Minimization of Multilevel Converters Using Genetic Algorithms

Total Harmonic Distortion Minimization of Multilevel Converters Using Genetic Algorithms Applied Mathematics, 013, 4, 103-107 http://dx.doi.org/10.436/am.013.47139 Published Online July 013 (http://www.scirp.org/journal/am) Total Harmonic Distortion Minimization of Multilevel Converters Using

More information

Basic idea: divide spectrum into several 528 MHz bands.

Basic idea: divide spectrum into several 528 MHz bands. IEEE 802.15.3a Wireless Information Transmission System Lab. Institute of Communications Engineering g National Sun Yat-sen University Overview of Multi-band OFDM Basic idea: divide spectrum into several

More information

Prof. P. Subbarao 1, Veeravalli Balaji 2

Prof. P. Subbarao 1, Veeravalli Balaji 2 Performance Analysis of Multicarrier DS-CDMA System Using BPSK Modulation Prof. P. Subbarao 1, Veeravalli Balaji 2 1 MSc (Engg), FIETE, MISTE, Department of ECE, S.R.K.R Engineering College, A.P, India

More information

Communications Theory and Engineering

Communications Theory and Engineering Communications Theory and Engineering Master's Degree in Electronic Engineering Sapienza University of Rome A.A. 2018-2019 TDMA, FDMA, CDMA (cont d) and the Capacity of multi-user channels Code Division

More information

4x4 Time-Domain MIMO encoder with OFDM Scheme in WIMAX Context

4x4 Time-Domain MIMO encoder with OFDM Scheme in WIMAX Context 4x4 Time-Domain MIMO encoder with OFDM Scheme in WIMAX Context Mohamed.Messaoudi 1, Majdi.Benzarti 2, Salem.Hasnaoui 3 Al-Manar University, SYSCOM Laboratory / ENIT, Tunisia 1 messaoudi.jmohamed@gmail.com,

More information

ECS455: Chapter 4 Multiple Access

ECS455: Chapter 4 Multiple Access ECS455: Chapter 4 Multiple Access 4.4 DS/SS 1 Dr.Prapun Suksompong prapun.com/ecs455 Office Hours: BKD 3601-7 Tuesday 9:30-10:30 Tuesday 13:30-14:30 Thursday 13:30-14:30 Spread spectrum (SS) Historically

More information

Access Methods and Spectral Efficiency

Access Methods and Spectral Efficiency Access Methods and Spectral Efficiency Yousef Dama An-Najah National University Mobile Communications Access methods SDMA/FDMA/TDMA SDMA (Space Division Multiple Access) segment space into sectors, use

More information

Multiple Access Techniques for Wireless Communications

Multiple Access Techniques for Wireless Communications Multiple Access Techniques for Wireless Communications Contents 1. Frequency Division Multiple Access (FDMA) 2. Time Division Multiple Access (TDMA) 3. Code Division Multiple Access (CDMA) 4. Space Division

More information

techniques are means of reducing the bandwidth needed to represent the human voice. In mobile

techniques are means of reducing the bandwidth needed to represent the human voice. In mobile 8 2. LITERATURE SURVEY The available radio spectrum for the wireless radio communication is very limited hence to accommodate maximum number of users the speech is compressed. The speech compression techniques

More information

Part A: Spread Spectrum Systems

Part A: Spread Spectrum Systems 1 Telecommunication Systems and Applications (TL - 424) Part A: Spread Spectrum Systems Dr. ir. Muhammad Nasir KHAN Department of Electrical Engineering Swedish College of Engineering and Technology February

More information

TIMA Lab. Research Reports

TIMA Lab. Research Reports ISSN 292-862 TIMA Lab. Research Reports TIMA Laboratory, 46 avenue Félix Viallet, 38 Grenoble France ON-CHIP TESTING OF LINEAR TIME INVARIANT SYSTEMS USING MAXIMUM-LENGTH SEQUENCES Libor Rufer, Emmanuel

More information

Multiplexing Module W.tra.2

Multiplexing Module W.tra.2 Multiplexing Module W.tra.2 Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University of New Mexico Albuquerque, NM, USA 1 Multiplexing W.tra.2-2 Multiplexing shared medium at

More information

Wireless Medium Access Control and CDMA-based Communication Lesson 08 Auto-correlation and Barker Codes

Wireless Medium Access Control and CDMA-based Communication Lesson 08 Auto-correlation and Barker Codes Wireless Medium Access Control and CDMA-based Communication Lesson 08 Auto-correlation and Barker Codes 1 Coding Methods in CDMA Use distinctive spreading codes to spread the symbols before transmission

More information

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

CDMA Mobile Radio Networks

CDMA Mobile Radio Networks - 1 - CDMA Mobile Radio Networks Elvino S. Sousa Department of Electrical and Computer Engineering University of Toronto Canada ECE1543S - Spring 1999 - 2 - CONTENTS Basic principle of direct sequence

More information

Multi-user Space Time Scheduling for Wireless Systems with Multiple Antenna

Multi-user Space Time Scheduling for Wireless Systems with Multiple Antenna Multi-user Space Time Scheduling for Wireless Systems with Multiple Antenna Vincent Lau Associate Prof., University of Hong Kong Senior Manager, ASTRI Agenda Bacground Lin Level vs System Level Performance

More information

SPS Gold Code Generation and Implementation for IRNSS User Receiver

SPS Gold Code Generation and Implementation for IRNSS User Receiver RESEARCH ARTICLE OPEN ACCESS SPS Gold Code Generation and Implementation for IRNSS User Receiver Shachi Varku 1, Swetha A 2, Sharanya S Konandur 3, Dileep D 4, Aklpita L Kulkarni 5 1,2,3,5 (Department

More information

IFH SS CDMA Implantation. 6.0 Introduction

IFH SS CDMA Implantation. 6.0 Introduction 6.0 Introduction Wireless personal communication systems enable geographically dispersed users to exchange information using a portable terminal, such as a handheld transceiver. Often, the system engineer

More information

UNIT I AMPLITUDE MODULATION

UNIT I AMPLITUDE MODULATION UNIT I AMPLITUDE MODULATION Prepared by: S.NANDHINI, Assistant Professor, Dept. of ECE, Sri Venkateswara College of Engineering, Sriperumbudur, Tamilnadu. CONTENTS Introduction to communication systems

More information

Available online at ScienceDirect. The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013)

Available online at  ScienceDirect. The 4th International Conference on Electrical Engineering and Informatics (ICEEI 2013) Available online at www.sciencedirect.com ScienceDirect Procedia Technology ( 23 ) 7 3 The 4th International Conference on Electrical Engineering and Informatics (ICEEI 23) BER Performance of Audio Watermarking

More information

Performance Comparison of Spreading Codes in Linear Multi- User Detectors for DS-CDMA System

Performance Comparison of Spreading Codes in Linear Multi- User Detectors for DS-CDMA System Performance Comparison of Spreading Codes in Linear Multi- User Detectors for DS-CDMA System *J.RAVINDRABABU, **E.V.KRISHNA RAO E.C.E Department * P.V.P. Siddhartha Institute of Technology, ** Andhra Loyola

More information

Physical Layer: Modulation, FEC. Wireless Networks: Guevara Noubir. S2001, COM3525 Wireless Networks Lecture 3, 1

Physical Layer: Modulation, FEC. Wireless Networks: Guevara Noubir. S2001, COM3525 Wireless Networks Lecture 3, 1 Wireless Networks: Physical Layer: Modulation, FEC Guevara Noubir Noubir@ccsneuedu S, COM355 Wireless Networks Lecture 3, Lecture focus Modulation techniques Bit Error Rate Reducing the BER Forward Error

More information

Design of Reed Solomon Encoder and Decoder

Design of Reed Solomon Encoder and Decoder Design of Reed Solomon Encoder and Decoder Shital M. Mahajan Electronics and Communication department D.M.I.E.T.R. Sawangi, Wardha India e-mail: mah.shital@gmail.com Piyush M. Dhande Electronics and Communication

More information

An Enhanced Least Significant Bit Steganography Technique

An Enhanced Least Significant Bit Steganography Technique An Enhanced Least Significant Bit Steganography Technique Mohit Abstract - Message transmission through internet as medium, is becoming increasingly popular. Hence issues like information security are

More information

Design of Spread-Spectrum Communication System Based on FPGA

Design of Spread-Spectrum Communication System Based on FPGA Sensors & Transducers 203 by IFSA http://www.sensorsportal.com Design of Spread-Spectrum Communication System Based on FPGA Yixin Yan, Xiaolei Liu, 2* Xiaobing Zhang College Measurement Control Technology

More information

Position Control of Servo Systems using PID Controller Tuning with Soft Computing Optimization Techniques

Position Control of Servo Systems using PID Controller Tuning with Soft Computing Optimization Techniques Position Control of Servo Systems using PID Controller Tuning with Soft Computing Optimization Techniques P. Ravi Kumar M.Tech (control systems) Gudlavalleru engineering college Gudlavalleru,Andhra Pradesh,india

More information

SPREADING CODES PERFORMANCE FOR CORRELATION FUNCTION USING MATLAB

SPREADING CODES PERFORMANCE FOR CORRELATION FUNCTION USING MATLAB International Journal of Electronics, Communication & Instrumentation Engineering Research and Development (IJECIERD) ISSN 2249-684X Vol. 3, Issue 2, Jun 2013, 15-24 TJPRC Pvt. Ltd. SPREADING CODES PERFORMANCE

More information

DESIGN AND ANALYSIS OF DS-CDMA DETECTED MULTIPATH SIGNALS USING THE RAKE RECEIVER SIMULATOR FOR WIRELESS COMMUNICATION.

DESIGN AND ANALYSIS OF DS-CDMA DETECTED MULTIPATH SIGNALS USING THE RAKE RECEIVER SIMULATOR FOR WIRELESS COMMUNICATION. International Journal of Computational Engineering Research Vol, 03 Issue, 7 DESIGN AND ANALYSIS OF DS-CDMA DETECTED MULTIPATH SIGNALS USING THE RAKE RECEIVER SIMULATOR FOR WIRELESS COMMUNICATION. 1, Parisae.Veera

More information

Wireless Communication: Concepts, Techniques, and Models. Hongwei Zhang

Wireless Communication: Concepts, Techniques, and Models. Hongwei Zhang Wireless Communication: Concepts, Techniques, and Models Hongwei Zhang http://www.cs.wayne.edu/~hzhang Outline Digital communication over radio channels Channel capacity MIMO: diversity and parallel channels

More information

Implementation of Different Interleaving Techniques for Performance Evaluation of CDMA System

Implementation of Different Interleaving Techniques for Performance Evaluation of CDMA System Implementation of Different Interleaving Techniques for Performance Evaluation of CDMA System Anshu Aggarwal 1 and Vikas Mittal 2 1 Anshu Aggarwal is student of M.Tech. in the Department of Electronics

More information

A Steganography Algorithm for Hiding Secret Message inside Image using Random Key

A Steganography Algorithm for Hiding Secret Message inside Image using Random Key A Steganography Algorithm for Hiding Secret Message inside Image using Random Key Balvinder Singh Sahil Kataria Tarun Kumar Narpat Singh Shekhawat Abstract "Steganography is a Greek origin word which means

More information

Analysis of Secure Text Embedding using Steganography

Analysis of Secure Text Embedding using Steganography Analysis of Secure Text Embedding using Steganography Rupinder Kaur Department of Computer Science and Engineering BBSBEC, Fatehgarh Sahib, Punjab, India Deepak Aggarwal Department of Computer Science

More information

Comparison of MIMO OFDM System with BPSK and QPSK Modulation

Comparison of MIMO OFDM System with BPSK and QPSK Modulation e t International Journal on Emerging Technologies (Special Issue on NCRIET-2015) 6(2): 188-192(2015) ISSN No. (Print) : 0975-8364 ISSN No. (Online) : 2249-3255 Comparison of MIMO OFDM System with BPSK

More information

OFDM AS AN ACCESS TECHNIQUE FOR NEXT GENERATION NETWORK

OFDM AS AN ACCESS TECHNIQUE FOR NEXT GENERATION NETWORK OFDM AS AN ACCESS TECHNIQUE FOR NEXT GENERATION NETWORK Akshita Abrol Department of Electronics & Communication, GCET, Jammu, J&K, India ABSTRACT With the rapid growth of digital wireless communication

More information

Digital Transceiver using H-Ternary Line Coding Technique

Digital Transceiver using H-Ternary Line Coding Technique Digital Transceiver using H-Ternary Line Coding Technique Abstract In this paper Digital Transceiver using Hybrid Ternary Technique gives the details about digital transmitter and receiver with the design

More information

Biologically Inspired Embodied Evolution of Survival

Biologically Inspired Embodied Evolution of Survival Biologically Inspired Embodied Evolution of Survival Stefan Elfwing 1,2 Eiji Uchibe 2 Kenji Doya 2 Henrik I. Christensen 1 1 Centre for Autonomous Systems, Numerical Analysis and Computer Science, Royal

More information

Chapter 7 Spread-Spectrum Modulation

Chapter 7 Spread-Spectrum Modulation Chapter 7 Spread-Spectrum Modulation Spread Spectrum Technique simply consumes spectrum in excess of the minimum spectrum necessary to send the data. 7.1 Introduction o Definition of spread-spectrum modulation

More information

QUESTION BANK SUBJECT: DIGITAL COMMUNICATION (15EC61)

QUESTION BANK SUBJECT: DIGITAL COMMUNICATION (15EC61) QUESTION BANK SUBJECT: DIGITAL COMMUNICATION (15EC61) Module 1 1. Explain Digital communication system with a neat block diagram. 2. What are the differences between digital and analog communication systems?

More information

Vesselin K. Vassilev South Bank University London Dominic Job Napier University Edinburgh Julian F. Miller The University of Birmingham Birmingham

Vesselin K. Vassilev South Bank University London Dominic Job Napier University Edinburgh Julian F. Miller The University of Birmingham Birmingham Towards the Automatic Design of More Efficient Digital Circuits Vesselin K. Vassilev South Bank University London Dominic Job Napier University Edinburgh Julian F. Miller The University of Birmingham Birmingham

More information

DESIGN, IMPLEMENTATION AND OPTIMISATION OF 4X4 MIMO-OFDM TRANSMITTER FOR

DESIGN, IMPLEMENTATION AND OPTIMISATION OF 4X4 MIMO-OFDM TRANSMITTER FOR DESIGN, IMPLEMENTATION AND OPTIMISATION OF 4X4 MIMO-OFDM TRANSMITTER FOR COMMUNICATION SYSTEMS Abstract M. Chethan Kumar, *Sanket Dessai Department of Computer Engineering, M.S. Ramaiah School of Advanced

More information

USING CHAOTIC SEQUENCE IN DIRECT SEQUENCE SPREAD SPECTRUM BASED ON CODE DIVISION MULTIPLE ACCESS (DS-CDMA)

USING CHAOTIC SEQUENCE IN DIRECT SEQUENCE SPREAD SPECTRUM BASED ON CODE DIVISION MULTIPLE ACCESS (DS-CDMA) USING CHAOTIC SEQUENCE IN DIRECT SEQUENCE SPREAD SPECTRUM BASED ON CODE DIVISION MULTIPLE ACCESS (DS-CDMA) Mahdi Sharifi 1 and Mohammad Jafar pour jalali 2 1 Department of Electrical and Computer Engineering,

More information

Spread Spectrum Communications and Jamming Prof. Debarati Sen G S Sanyal School of Telecommunications Indian Institute of Technology, Kharagpur

Spread Spectrum Communications and Jamming Prof. Debarati Sen G S Sanyal School of Telecommunications Indian Institute of Technology, Kharagpur Spread Spectrum Communications and Jamming Prof. Debarati Sen G S Sanyal School of Telecommunications Indian Institute of Technology, Kharagpur Lecture - 01 Introduction to Spread Spectrum Communication

More information

PERFORMANCE AND COMPARISON OF LINEAR MULTIUSER DETECTORS IN DS-CDMA USING CHAOTIC SEQUENCE

PERFORMANCE AND COMPARISON OF LINEAR MULTIUSER DETECTORS IN DS-CDMA USING CHAOTIC SEQUENCE PERFORMANCE AND COMPARISON OF LINEAR MULTIUSER DETECTORS IN DS-CDMA USING CHAOTIC SEQUENCE D.Swathi 1 B.Alekhya 2 J.Ravindra Babu 3 ABSTRACT Digital communication offers so many advantages over analog

More information

By Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor

By Ryan Winfield Woodings and Mark Gerrior, Cypress Semiconductor Avoiding Interference in the 2.4-GHz ISM Band Designers can create frequency-agile 2.4 GHz designs using procedures provided by standards bodies or by building their own protocol. By Ryan Winfield Woodings

More information

International Journal of Digital Application & Contemporary research Website: (Volume 1, Issue 7, February 2013)

International Journal of Digital Application & Contemporary research Website:   (Volume 1, Issue 7, February 2013) Performance Analysis of OFDM under DWT, DCT based Image Processing Anshul Soni soni.anshulec14@gmail.com Ashok Chandra Tiwari Abstract In this paper, the performance of conventional discrete cosine transform

More information

Journal of American Science 2015;11(7)

Journal of American Science 2015;11(7) Design of Efficient Noise Reduction Scheme for Secure Speech Masked by Signals Hikmat N. Abdullah 1, Saad S. Hreshee 2, Ameer K. Jawad 3 1. College of Information Engineering, AL-Nahrain University, Baghdad-Iraq

More information

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD

LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE THE METHOD LOSSLESS CRYPTO-DATA HIDING IN MEDICAL IMAGES WITHOUT INCREASING THE ORIGINAL IMAGE SIZE J.M. Rodrigues, W. Puech and C. Fiorio Laboratoire d Informatique Robotique et Microlectronique de Montpellier LIRMM,

More information

Analysis, Design and Testing of Frequency Hopping Spread Spectrum Transceiver Model Using MATLAB Simulink

Analysis, Design and Testing of Frequency Hopping Spread Spectrum Transceiver Model Using MATLAB Simulink Analysis, Design and Testing of Frequency Hopping Spread Spectrum Transceiver Model Using MATLAB Simulink Mr. Ravi Badiger 1, Dr. M. Nagaraja 2, Dr. M. Z Kurian 3, Prof. Imran Rasheed 4 M.Tech Digital

More information

Basics of Spread Spectrum Systems

Basics of Spread Spectrum Systems IMPERIAL COLLEGE LONDON, DEPARTMENT of ELECTRICAL and ELECTRONIC ENGINEERING. COMPACT LECTURE NOTES on COMMUNICATION SYSTEMS. Prof. Athanassios Manikas, Autumn 2007 Basics of Spread Spectrum Systems 1.

More information

Frequency Hopping Spread Spectrum

Frequency Hopping Spread Spectrum Frequency Hopping Spread Spectrum 1. Bluetooth system The Equipment Under Test (EUT) is the Digital Video Camera Recorder, witch has a Bluetooth communication module internally. Bluetooth is the one of

More information

6. FUNDAMENTALS OF CHANNEL CODER

6. FUNDAMENTALS OF CHANNEL CODER 82 6. FUNDAMENTALS OF CHANNEL CODER 6.1 INTRODUCTION The digital information can be transmitted over the channel using different signaling schemes. The type of the signal scheme chosen mainly depends on

More information

CONVOLUTIONAL CODED GENERALIZED DIRECT SEQUENCE SPREAD SPECTRUM

CONVOLUTIONAL CODED GENERALIZED DIRECT SEQUENCE SPREAD SPECTRUM CONVOLUTIONAL CODED GENERALIZED DIRECT SEQUENCE SPREAD SPECTRUM 1 VISHAL J. PATEL, 2 MITESH D. PATEL 1, PG Student, E.C. Department KIT&RC, Kalol, Gujarat, India 2, Associate Professor, E.C. Department

More information

Performance Analysis of Cognitive Radio based WRAN over Rayleigh Fading Channel with Alamouti-STBC 2X1, 2X2&2X4 Multiplexing

Performance Analysis of Cognitive Radio based WRAN over Rayleigh Fading Channel with Alamouti-STBC 2X1, 2X2&2X4 Multiplexing Performance Analysis of Cognitive Radio based WRAN over Rayleigh Fading Channel with Alamouti-STBC 2X1 2X2&2X4 Multiplexing Rahul Koshti Assistant Professor Narsee Monjee Institute of Management Studies

More information

Optimized BPSK and QAM Techniques for OFDM Systems

Optimized BPSK and QAM Techniques for OFDM Systems I J C T A, 9(6), 2016, pp. 2759-2766 International Science Press ISSN: 0974-5572 Optimized BPSK and QAM Techniques for OFDM Systems Manikandan J.* and M. Manikandan** ABSTRACT A modulation is a process

More information

Spread Spectrum Signal for Digital Communications

Spread Spectrum Signal for Digital Communications Wireless Information Transmission System Lab. Spread Spectrum Signal for Digital Communications Institute of Communications Engineering National Sun Yat-sen University Multiple Access Schemes Table of

More information

BER Analysis of BPSK and QAM Modulation Schemes using RS Encoding over Rayleigh Fading Channel

BER Analysis of BPSK and QAM Modulation Schemes using RS Encoding over Rayleigh Fading Channel BER Analysis of BPSK and QAM Modulation Schemes using RS Encoding over Rayleigh Fading Channel Faisal Rasheed Lone Department of Computer Science & Engineering University of Kashmir Srinagar J&K Sanjay

More information

J. Electrical Systems 13-3 (2017): Regular paper. An efficient digital signal processing method for RRNS-based DS-CDMA systems

J. Electrical Systems 13-3 (2017): Regular paper. An efficient digital signal processing method for RRNS-based DS-CDMA systems Peter Olsovsky 1,*, Peter Podhoransky 1 J. Electrical Systems 13-3 (2017): 606-617 Regular paper An efficient digital signal processing method for RRNS-based DS-CDMA systems JES Journal of Electrical Systems

More information

Performance Analysis Of Multi Carrier CDMA System

Performance Analysis Of Multi Carrier CDMA System IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735. PP 12-18 www.iosrjournals.org Darshini. R 1, Dhanalakshmi. V 2, P. Velavan 3, R. Mirunalini 4

More information

A New Image Steganography Depending On Reference & LSB

A New Image Steganography Depending On Reference & LSB A New Image Steganography Depending On & LSB Saher Manaseer 1*, Asmaa Aljawawdeh 2 and Dua Alsoudi 3 1 King Abdullah II School for Information Technology, Computer Science Department, The University of

More information

Spread Spectrum Basics Spreading Codes IS-95 Features- Transmitter/Receiver Power Control Diversity Techniques RAKE Receiver Soft Handoff

Spread Spectrum Basics Spreading Codes IS-95 Features- Transmitter/Receiver Power Control Diversity Techniques RAKE Receiver Soft Handoff CDMA Mobile Communication & IS-95 1 Outline Spread Spectrum Basics Spreading Codes IS-95 Features- Transmitter/Receiver Power Control Diversity Techniques RAKE Receiver Soft Handoff 2 Spread Spectrum A

More information

Steganography on multiple MP3 files using spread spectrum and Shamir's secret sharing

Steganography on multiple MP3 files using spread spectrum and Shamir's secret sharing Journal of Physics: Conference Series PAPER OPEN ACCESS Steganography on multiple MP3 files using spread spectrum and Shamir's secret sharing To cite this article: N. M. Yoeseph et al 2016 J. Phys.: Conf.

More information

Spread Spectrum: Definition

Spread Spectrum: Definition Spread Spectrum: Definition refers to the expansion of signal bandwidth, by several orders of magnitude in some cases, which occurs when a key is attached to the communication channel an RF communications

More information

KINGS COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK. Subject Name: Digital Communication Techniques

KINGS COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK. Subject Name: Digital Communication Techniques KINGS COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING QUESTION BANK Subject Code: EC1351 Year/Sem: III/IV Subject Name: Digital Communication Techniques UNIT I PULSE MODULATION

More information

RFID Anti-Collision System Using the Spread Spectrum Technique

RFID Anti-Collision System Using the Spread Spectrum Technique Using the Spread Spectrum Technique Document ID: PG-TR-050426-AR Date: 26 April 2005 Anil Rohatgi 777 Atlantic Ave. Atlanta GA 30332-0250 Voice: (404)894-8169 Fax: (404)894-5935 http://www.propagation.gatech.edu

More information

The figures and the logic used for the MATLAB are given below.

The figures and the logic used for the MATLAB are given below. MATLAB FIGURES & PROGRAM LOGIC: Transmitter: The figures and the logic used for the MATLAB are given below. Binary Data Sequence: For our project we assume that we have the digital binary data stream.

More information