Spread Spectrum Image Watermarking for Secured Multimedia Data Communication

Size: px
Start display at page:

Download "Spread Spectrum Image Watermarking for Secured Multimedia Data Communication"

Transcription

1 Word Academy of Scence, Engneerng and Technoogy Internatona Journa of Computer and Informaton Engneerng Vo:, No:6, 007 Spread Spectrum Image Watermarkng for Secured utmeda Data Communcaton Trtha S. Das, Ayan K. Sau, and Subr K. Sarkar Internatona Scence Index, Computer and Informaton Engneerng Vo:, No:6, 007 waset.org/pubcaton/840 Abstract Dgta watermarkng s a way to provde the facty of secure mutmeda data communcaton besdes ts copyrght protecton approach. The Spread Spectrum moduaton prncpe s wdey used n dgta watermarkng to satsfy the robustness of mutmeda sgnas aganst varous sgna-processng operatons. Severa SS watermarkng agorthms have been proposed for mutmeda sgnas but very few works have dscussed on the ssues responsbe for secure data communcaton and ts robustness mprovement. The current paper has crtcay anayzed few such factors namey propertes of spreadng codes, proper sgna decomposton sutabe for data embeddng, securty provded by the key, successve bt canceaton method apped at decoder whch have greater mpact on the detecton reabty, secure communcaton of sgnfcant sgna under camoufage of nsgnfcant sgnas etc. Based on the anayss, robust SS watermarkng scheme for secure data communcaton s proposed n waveet doman and mprovement n secure communcaton and robustness performance s reported through expermenta resuts. The reported resut aso shows mprovement n vsua and statstca nvsbty of the hdden data. Keywords Spread spectrum moduaton, spreadng code, sgna decomposton, securty, successve bt canceaton D I. INTRODUCTION IGITAL watermarkng agorthms can be thought as dgta communcaton scheme where an auxary message s embedded n dgta mutmeda sgnas and are avaabe where ever the atter sgnas move. The decoded message atter on serves the purpose of securty n communcaton, copyrght protecton, data authentcaton, broadcast montorng etc. Robustness s an essenta crteron n dgta mutmeda watermarkng schemes aong wth vsua transparency, hgh data embeddng rate, ow computaton cost and compexty of the agorthms needed for data embeddng and recovery purpose. * A these requrements are reated n confctng manner and the partcuar agorthmc deveopment emphaszes to a greater extent on one or more such requrements dependng on the type of appcaton. In dgta communcaton spread spectrum moduaton fnds wde usages n hoste envronment as we as n mutpe access communcaton system due to ts nherent ant-jammng anuscrpt receved on January, 006. T. S. Das s wth the Gurunanak Insttute of Technoogy, Panhat, 7004, Inda (e-ma: trthasankardas@yahoo.com. A. K. Sau s wth the Jadavpur Unversty, Jadavpur-70003, Inda (e-ma: ayankumarsau@yahoo.com. S. K. Sarkar s wth the Jadavpur Unversty, Jadavpur-70003, Inda (ema: sksarkar@etce.jdvu.ac.n. and nterference rejecton property [-3]. These attrbutes motvate researchers to deveop severa SS watermarkng schemes for mutmeda sgnas. The SS watermarkng that uses dstnct pseudo nose (PN spreadng codes for embeddng each bnary dgt s popuar and s proven to be effcent, robust and cryptographcay secure. The motvaton of the present work stems from fndng out factors that have greater mpact on mprovement n secure data communcaton and ts detecton reabty of SS watermarkng scheme. II. SPREAD SPECTRU WATERARKING AND DETECTION Spread Spectrum watermarkng and detecton s accompshed by embeddng every watermark bt over many sampes of cover mage usng a moduated pseudo random spreadng sequence [4-6]. SS watermark embeddng and detecton are anayzed mathematcay as foows: A. Watermark nserton Let B denotes the bnary vaued watermark bts strng as a sequence of N bts. B { b, b, b3,..., b3}, b ε{,0} ( If I denotes the mage bock of ength L.e. mage transformaton coeffcents of ength L, a bnary vaued code pattern of ength s used to spread each watermark bt. Therefore, a set P of N code patterns, each of ength are generated to form watermark sequence W by performng the foowng operaton. N ( [ W ] b [ P ] The watermarked mage I w can be obtaned by embeddng watermark nformaton W nto the mage bock I. The data embeddng operaton can be mathematcay expressed as foows: [( IW ] [ I ] + α.[ W ] (3 Where α s the moduaton ndex and ts proper choce w optmze the maxmum amount of aowed dstorton and mnmum watermark energy needed for a reabe detecton. α may or may not be a functon of mage coeffcents. Accordngy SS watermarkng schemes can be caed as sgna adaptve or non-adaptve SS watermarkng. B. Watermark detecton In SS watermarkng, the detecton reabty for bnary vaued watermark depends on decson varabe t obtaned by computng the zero ag spata cross-covarance functon Internatona Schoary and Scentfc Research & Innovaton ( schoar.waset.org/ /840

2 Word Academy of Scence, Engneerng and Technoogy Internatona Journa of Computer and Informaton Engneerng Vo:, No:6, 007 Internatona Scence Index, Computer and Informaton Engneerng Vo:, No:6, 007 waset.org/pubcaton/840 between the watermarked mage I w and every code pattern P. The decson varabe t can be mathematcay expressed as foows: t P m( P, IW m( IW (0 (4 where m (S represents the average of the sequence S. If S k represents the eements of S wth k,,3,, then m (S can be mathematcay expressed as foows: (5 m( S s k k The symbo (0 n (4 ndcates the zero ag cross-correaton and for two sequences S and R, the zero ag cross correaton s gven by: (6 S, R (0 s k r k k Where s k and r k are the eements of sequence S and R respectvey wth k,,3,,. The bt b s detected as zero f t >0 and as one otherwse. If the code pattern P s chosen n such a way so that m (P 0, the computaton of t becomes P, I + α. N t P, I + α. N b P m ( I b P, P P, m ( I (7 (8 P, I (9 W III. DESIRABLE PROPERTIES FOR IPROVED WATERARK DETECTION Ths anayss ndcates that the code patterns used for spread spectrum watermarkng shoud posses some specfc propertes. Watermark detecton s mproved f the foowng condtons are satsfed:. P,,, 3,, shoud be dstnct sequences wth zero average.. The spata correatons <P, P j >, j shoud be mnmzed. Ideay sequences P and P j shoud be orthogona whenever j. 3. Each P for I,,3,, shoud be uncorreated wth the mage bock I when mage predcton (for estmatng mage dstorton s not used before evauatng the cross-correaton. A. Transform for data hdng Over the years waveet transform (WT attracts attenton n varous mage processng appcatons ncudng dgta mage watermarkng, detecton, denosng and the upcomng mage compresson standard JPEG-000 due to ts cojont representaton n the form of space-frequency resouton, whch provdes both oca and goba nformaton of mage sgna [7-0]. The DWT system decomposes the mage sgna nto LL, LH, HL and HH sub bands whe band waveet system decomposes the same nto ( X channes, correspondng to dfferent drecton and resouton. Such decomposton aows data embeddng n dfferent channes that offers resency aganst varous mage mparments. In context of SS watermarkng, data embeddng s recommended n waveet coeffcents of LL, LH, HL and HH sub bands (n case of DWT and n group of channes wth few hghest and few owest varance (n case of -band WT, varance s cacuated for a the x channes and paced n descendng order; one group s formed by takng the channes of extremey hgh varance vaues and other group s formed by takng the channes of extremey ow varance vaues vaues of coeffcents [-4]. Because these above-mentoned sub bands/channes are very much dssmar n nature compared to other combnaton of sub bands/channes mpyng that they jonty provde wde range of frequency components of cover mage. To justfy the seecton of data embeddng regons on the bass of better spectrum spreadng, varance of dfferent channes are computed. The varance for coeffcents of channes H, H 3, H 4, H 4 and the channes H 4, H 4, H 43 and H 3 for ( 4 band system are aways the few owest and few hghest vaues. B. Code Propertes Hgh detecton reabty can be acheved f code pattern sequences possess very ow zero ag cross correaton among each other as we as wth mage bock when mage predcton s not used to evauate the cross correaton [5, 6]. The code patterns P used frequenty for SS moduatons are (a Fg. (a Sub bands correspondng to DWT decomposton Cross covarance among dfferent DWT sub bands Internatona Schoary and Scentfc Research & Innovaton ( schoar.waset.org/ /840

3 Word Academy of Scence, Engneerng and Technoogy Internatona Journa of Computer and Informaton Engneerng Vo:, No:6, 007 Internatona Scence Index, Computer and Informaton Engneerng Vo:, No:6, 007 waset.org/pubcaton/840 pseudorandom or pseudo nose (PN sequences. The rand ( and srand ( functons of ANSI C brary can be used to generate PN sequences by near congruentua generators. Here atab s PN generator can aso be used. But n both (a Fg. (a Varance of dfferent channes; Frequency bands correspondng to 4 band decomposton cases the desred propertes of m (P 0 and <P, P j > 0 for j I can be theoretcay guaranteed f nfnte ength sequences, whch of course s not feasbe for practca mage processng operaton. The wdey used PN codes n spread spectrum moduaton s the maxmum ength sequence or m-sequences that exhbt some correaton among each other and does not provde good detecton. ayer et a proposed determnstc sequences from Wash and Hadamard bass and generaton by Gram-Schmdt orthogonazaton of pseudorandom sequences, whch woud sgnfcanty ncrease the detecton reabty compared to the tradtona PN generaton when the mage bock sze s sma [7]. On the other hand, for better spectrum spreadng of the embedded data the mage bock wth arge sze s desrabe. oreover f Wash Hadamard bass s used as spreadng codes the embedded data may be extracted by thrd party due to the determnstc nature of the bass functon. To sove the probems Wash/Hadamard bass functon s used here to moduate the code patterns. Each PN code s XOR-ed wth a row of Hadamard or Wash matrx of proper dmenson, whch s anaogous to the Wash coverng n DS-CDA dgta ceuar system (IS-95 deveoped by Qua comm. Inc [8-30]. C. Choce of moduaton functons The man dea behnd the mprovement n detecton reabty s to expot the knowedge about the sgna I (or more respectvey, the projecton of I on the watermark and accordngy to moduate the energy of the nserted watermark n order to compensate for the sgna nterference. To accompsh ths sgna adaptve SS watermarkng, we vary the amptude of the nserted chp sequence by usng near and power-aw transformaton functons. We show under, a fxed attack dstorton, better detecton reabty n such cases s possbe compared to conventona sgna non-adaptve SS scheme. We now have three dfferent forms of watermarked mage as foows: I I ± k.[ P ] (0 I I ± k. I.[ P ] ( µ I I ± I.[ P ] ( Equaton (0 represents conventona sgna non-adaptve SS watermarkng scheme where as ( and ( are sgna adaptve SS watermarkng scheme usng near and power-aw moduaton functons respectvey. TABLE I IPROVEENT IN ZERO AVERAGING FOR ATALB GENERATED PN SEQUENCE USING WALSH/HADAARD BASIS 0Code Patterns (PN sze (8 x 8 No. of 0s before moduaton No. of s before moduaton No. of 0s after moduaton No. of s after moduaton PN PN PN PN PN In a the above equatons I represents watermarked mage coeffcents, I are mage coeffcents, P s the code pattern wth ength equa to the mage bock, k s the gan factor or moduaton ndex, k s the rato of mnmum mage coeffcent to maxmum mage coeffcent, a negatve quantty, µ s the moduaton ndex n power ow moduaton functon. The moduaton ndex µ s negatve numerc quantty wth vaue 0 to -. Detecton reabty n each case s determned by the stabty of the decson varabe t wth respect to a gven attack dstorton. The expresson of t for a partcuar P s rewrtten here for convenence of our further anayss. t < I', P > < I', P > (3 Internatona Schoary and Scentfc Research & Innovaton ( schoar.waset.org/ /840

4 Word Academy of Scence, Engneerng and Technoogy Internatona Journa of Computer and Informaton Engneerng Vo:, No:6, 007 Internatona Scence Index, Computer and Informaton Engneerng Vo:, No:6, 007 waset.org/pubcaton/840 where s the ength of the sequence. If we substtute the vaue of I from (0, ( and ( nto (3, the expressons of t becomes as foows respectvey: t / ( I ± k.p ( P t t / ( I. P ± k. P / (I ± k.i.p ( P / ( I. P ± k. I. P µ / ( I ± I.P( P (4 (5 (a (c Fg. 3 Reducton n correaton usng Wash/Hadamard bass; hm ndcates the correaton after moduaton / ( I. P ± I µ. P (6 It s aready shown that mproved detecton requres zero averagng sequence.e. n the code pattern number of zero shoud be equa to the number of one. Dfferentatng (4, (5 and (6 wth respect to I and nvokng the above property of the code pattern, we do have the expressons of dt / di as foows: dt dt / di (0. / di P +. (0. +. ( + k dt + / di ( P + kp µ. I k + ( ( µ (0. P + µ. P I +. ( µ P (7 (8 (9 We have defned k I (mn / I (max n (8, a negatve quantty and et k - k, the expresson of dt / di for the equaton becomes as foows: dt / di ( k / < dt / di (0 In (7, (9 and (0 dt / di denote the change of decson varabe t wth respect to the change of I.e. a measure of nose mmunty n the detecton process. Lower vaue of dt / di ndcates better detecton reabty. IV. PROPOSED WATERARKING SCHEE Internatona Schoary and Scentfc Research & Innovaton ( schoar.waset.org/ /840

5 Word Academy of Scence, Engneerng and Technoogy Internatona Journa of Computer and Informaton Engneerng Vo:, No:6, 007 Internatona Scence Index, Computer and Informaton Engneerng Vo:, No:6, 007 waset.org/pubcaton/840 A. Basc spread spectrum watermarkng Watermark nformaton (ogo/data, audo data and vdeo data s embedded accordng to (3 n channes H, H 3, H 4, H 4 and H 4, H 4, H 43 and H 3 of -band ( 4 decomposton of the cover mage. For each watermark bt, one PN sequence of ength equa to the sze of each channe s generated. If the code PN s used for data embeddng n H 4, H 4, H 43 or H 3 channe, then the orthogona code (PN Fg. 4 Bock dagram of SS watermarkng scheme obtaned by compementng the bts of PN code are used for data embeddng n H, H 3, H 4 or H 4 channe. Here the data/ogo s redundanty embedded n H 4 and H channes, audo nformaton n H 4 and H 3 channes and vdeo data n H 43, H 3 and H 4, H 4 channes. Here our objectve s to transmt mutmeda data. Therefore the sgnfcant nformaton s encoded wth dstnct set of keys n four channes and other two types of nsgnfcant nformaton s embedded usng the same set of keys n ony two channes Fg. 5 Bock dagram of watermark decodng each. Snce data embeddng regons are dfferent n each type of nformaton, so there woud a tte nterference despte the same set of keys for nsgnfcant messages. In ths way we can transmt our sgnfcant mutmeda nformaton under the camoufage of nsgnfcant data. B. -ary moduaton and demoduaton n SS watermarkng In dgta communcaton the smaest nformaton entty s caed as symbo where n bnary sgnang there are two dfferent symbos and n - ary ( > sgnang there are more than two numbers of dfferent symbos [, ]. The n -ary refers to the number of symbos used n communcaton scheme. From communcaton theory we know that for a certan moduaton scheme an ncrease n the number of the symbo decreases the symbo error probabty. Now the use of -ary moduaton n dgta watermarkng s dscussed n the foowng paragraph. In -ary sgnang f more number of bts are used to represent a symbo of fxed ength bnary message, the fewer number of symbos decrease the error probabty by provdng the more ocatons of embeddng for each symbo [3, 4]. In transform doman SS watermarkng scheme, the mprovement n performance due to the usages of -ary moduaton can be expaned as foows. When more number of bts are used to from a symbo.e. the arger the vaue of, ess be the numbers of symbos need to be hdden for a gven ength of bnary message and there s the scope of choosng of hgher moduaton ndex vaue. In other words for a gven embeddng dstorton, hgher moduaton ndex vaue can be chosen n -ary sgnang compared to bnary sgnang. The hgher moduaton ndex vaues mprove robustness performance.e. reabty of transmsson through nosy channe. Fg. shows the bock dagram of -ary moduaton based SS watermark embeddng scheme. -ary moduaton scheme frst maps a L bt ong message (say of two symbos sgna to dfferent symbos message by groupng og ( bts of the orgna message to one symbo. Each symbo s represented by a b-eve spread spectrum moduaton functon (PN matrx and the tota number of functons n the bass set S (where N shoud be equa to the tota number of symbo message. So f ( m, where each symbo s represented by m bts and N represent the number of dfferent dstnct symbos and tota number of symbos n the symbo message respectvey, we need dfferent sets of code patterns each havng N number of b-eve moduaton functon. Fg. 7 shows the bock dagram of watermark decodng n -ary system. To decode a symbo at one partcuar poston, correaton between the embedded mage bock and the moduaton functons of that partcuar poston for a the sets of keys are cacuated. The ndex of the argest correaton coeffcent.e. the partcuar set of key whose moduaton functon of respectve poston yeds the maxmum correaton vaue determnes the decoded symbo. C. Desgn of experment Internatona Schoary and Scentfc Research & Innovaton ( schoar.waset.org/ /840

6 Word Academy of Scence, Engneerng and Technoogy Internatona Journa of Computer and Informaton Engneerng Vo:, No:6, 007 Internatona Scence Index, Computer and Informaton Engneerng Vo:, No:6, 007 waset.org/pubcaton/840 We empoy -ary moduaton n SS data embeddng for dgta mages athough the experments, whch can aso be done for other knd of data, ke audo, musc, vdeo etc. The Fg. 6 Bock dagram of -ary based SS watermarkng scheme cover mage I s a gray eve mage of sze (N*N where N p and the reference watermark w s a bnary mage of sze (* where n. The vaues of p and n, ndcate the sze of the cover and the watermark mage where p > n, typcay (p/n > 4. The proposed work consders a bnary mage sze (6 *6 as watermark and (56, 8 bts/pxe gray mage as cover mage. In order to show the better comparson of -ary moduaton scheme, data s embedded separatey n spata (drecty n pxe vaues doman as we as n transform doman. Athough there are many transformatons such as DCT, DFT, Fourer- en, DHT etc. but we use here dscrete waveet transform (DWT as t attracts attenton n varous mage processng appcaton ncudng dgta mage watermarkng, detecton, de nosng and the upcomng mage compresson standard JPEG-000 due to ts co-jont representaton of the mage sgna [5]. The norma DWT ( Fg. 7 Bock dagram of watermark decodng n -ary system band system decomposes an mage sgna nto LL (ow- ow, LH (ow- hgh, HL (hgh-ow and HH (hgh-hgh sub bands whe the -band dscrete waveet transformaton (bdwt system decomposes the same nto (* channes, correspondng to dfferent drecton and resouton. In case of DWT decomposton these sub bands correspond to the coarse approxmaton, horzonta, vertca and dagona deta of the mage sgna respectvey. In order to accompsh better spectrum spreadng we embedded data n LL and HH sub bands ( band system and few seected channes (-band system wth ow and hgh varance vaues. In the case of - band waveet decomposton (where 4 resuts obtaned from the arge number of mages show that the varance vaues for the coeffcents of sub bands H, H 3, H 4, H 4 are aways n the ower range and for the sub bands H 4, H 4, H 43, H 3, are n the upper range. A set of bnary vaued Pseudo Number (PN equa to the sze of mage bock are generated and for each PN the orthogona code PN s obtaned by compementng the bts of PN code. Each PN and PN matrx are moduated by one row of Hadamard matrx wth proper dmenson. Hadamard bass s used to decrease crosscorreaton among PN codes. Ths s possbe snce rows and coumns are orthogona to each other. If the code PN s used for data embeddng n LL sub band (H, H 3, H 4, H 4, the orthogona code PN obtaned by compementng the bts of PN are used for data embeddng n HH sub band (H 4, H 4, H 43, H 3. The use of PN and PN ndcates ow correspondng mage bocks.e. sub bans or channes and property (3 of the code pattern s thus fufed. V. RESULTS AND DISCUSSION We test the effect of severa above-mentoned factors n robustness mprovement over arge number of bench marked mages ke Fshng Boat, Lena, Ps, US ar force etc. We use peak sgna to nose rato (PSNR and structura smarty ndex measurement (SSI as representatve objectve measure of data mperceptbty where as reatve entropy dstance (Kuback Leber dstance as measure of securty (ε. Numerca resuts for these measures are shown n tabe II and III. Varous non macous as we as deberate mage degradaton n the form of near & nonnear fterng, sharpenng, hstogram equazaton, change n dynamc range, couson, corrupton by addtve nose and specke and random nose, ossy mage compresson ke JPEG & JPEG-000 etc. have been smuated over the watermarked mages as proof of the mprovement n detecton reabty. However we ony show the mprovement n detecton aganst addtve whte gaussan nose and JPEG & JPEG-000 compresson. We treat dgta watermarkng ads a probem of dgta communcaton and mutua nformaton s consdered as objectve measure to quantfy the robustness effcency. Internatona Schoary and Scentfc Research & Innovaton ( schoar.waset.org/ /840

7 Word Academy of Scence, Engneerng and Technoogy Internatona Journa of Computer and Informaton Engneerng Vo:, No:6, 007 Expermenta resuts show that data embeddng n -band coeffcents show better robustness compared to DWT doman ncreased varance vaue s the reason of ow correaton between the mage bocks and code patterns (9. Low correaton vaue reduces the vaue of dt / di for a gven attack dstorton. In case of -ary moduaton, SS watermarkng scheme s TABLE II RESULTS OF PSNR, SSI SECURITY VALUE FOR FISHING BOAT IAGE USING DWT AND -BAND DECOPOSITION Decomposton Technque PSNR vaue (db SSI vaue Securty (ε vaue DWT Band Internatona Scence Index, Computer and Informaton Engneerng Vo:, No:6, 007 waset.org/pubcaton/840 (a Fg. 8 Robustness resuts aganst (a JPEG; JPEG-000 compresson; hm ndcates moduaton usng Hadamard bass embeddng athough the performance of the atter s much better wth respect to other SS watermarkng schemes mpemented by usng DCT, Wash-Hadamard transformaton. Fg. 8 and 9 show graphcay the mprovement n detecton reabty aganst JPEG, JPEG 000 compresson for -band over DWT decomposton. The fgures aso hghght the effect of Wash-Hadamard bass n mprovng the robustness effcency. The roe of usng dfferent moduaton functons n robustness mprovement s shown n tabe aganst addtve whte gaussan nose. The fgure shows that wth the ncrease of depth of nose addton near moduaton functon show better detecton compared to tradtona SS watermarkng scheme. Ths s qute cear from (7 and (0 where for a gven attack dstorton change n decson varabe t n case of near moduaton functon I ess compared to conventona moduaton functon. Under the same crcumstance a better detecton s acheved n power-aw functon s used nstead of near moduaton functon. Ths s due to the fact that wth the decrease n numerca vaue of µ, the varance of the embedded coeffcents of the sub bands s ncreased. The apped over arge number of bench marked mages. Data s embedded separatey n spata doman, LL and HH sub bands obtaned after DWT decomposton and few seectve sub channes of ow and hgh varance bocks after -band decomposton. The performance of -ary moduaton s shown n Fg. 0 where t s qute cear that wth the ncrease of vaue robustness effcency s aso mproved but at the same tme computaton cost of decodng s aso ncreased. The reason for the atter pont s that for decodng a partcuar symbo the embedded channe s projected onto the a moduaton functons of that partcuar poston for each set of the key. It s aso cear from the fgures that robustness performance for any vaue of n -ary moduaton s better for -band waveet decomposton compared to DWT decomposton whe the performance of the atter s comparatvey better than spata doman SS embeddng scheme. The resut s reported for JPEG-000 compresson operaton; however the resut s aso vad for other types of sgna processng operaton such as near & nonnear fterng, sharpenng, hstogram equazaton, change n Fg. 9 Robustness resut of dfferent moduaton functons for fxed gaussan nose dstorton Internatona Schoary and Scentfc Research & Innovaton ( schoar.waset.org/ /840

8 Word Academy of Scence, Engneerng and Technoogy Internatona Journa of Computer and Informaton Engneerng Vo:, No:6, 007 Internatona Scence Index, Computer and Informaton Engneerng Vo:, No:6, 007 waset.org/pubcaton/840 (a Fg. 0 -ary moduaton for (a JPEG compresson; JPEG-000 compresson dynamc range, corrupton by addtve nose as we as other popuar ossy mage compresson ke JPEG. A. Increased Capacty usng mutpe watermarkng & borthogona waveet. The capacty of the watermarked mage can be ncreased usng Spread Spectrum utpe watermarkng scheme. Here, the mutpe watermarks are embedded over the same cover mage usng the same basc watermarkng technque but wth dstnct set of keys. Therefore more than one authentcate user can easy use the same cover mage for data embeddng and compete secrecy of ther nformaton (.e. watermark can be mantaned among those users. Snce Spread Spectrum technque s used for data embeddng and t s popuar for ts ant-jammng and nterference rejecton property, so ths scheme shows better mperceptbty as we as robustness compared to the other non Spread Spectrum technques. The dsadvantage of ths mutpe watermarkng s that, athough Spread Spectrum s used for watermarkng but embeddng dstorton can t be gnored. Snce a the watermarks are embedded n the same drecton of the waveet decomposton of the cover mage so naturay adjacent channe nterference woud be the maxmum. Therefore the securty of the dfferent hdden messages aso woud be affected. In order to ncrease the capacty of the watermarked mage wth mnmum embeddng dstorton, the borthogona waveet transform s used here. Its speca feature s that t provdes two scang functons nstead of one and therefore just ke quadrature phase shft keyng ths transform gves four possbe drecton of decomposton. If the correatons among a these drectons by takng two at a tme are seem to be mnmum then we can nfer that a the co-channe and adjacent channe nterference w be mnmum. So we can expect a better mperceptbty, robustness as we as securty of the hdden data. Another advantage s that snce borthogona waveet decomposton provdes four data embeddng drecton, so the four dfferent watermarks can be embedded usng the same set of key nstead of dfferent sets of key. Therefore, the tme compexty of the key rather code generaton woud be much smpfed. B. Successve bt/watermark canceaton method (a Fg. (a JPEG compresson (wth orthogonaty; JPEG compresson (wthout orthogonaty Internatona Schoary and Scentfc Research & Innovaton ( schoar.waset.org/ /840

9 Word Academy of Scence, Engneerng and Technoogy Internatona Journa of Computer and Informaton Engneerng Vo:, No:6, 007 Each bt of the watermark s retreved on the bass of crosscorreaton threshod vaue. Snce mutpe watermarks (text, audo and vdeo.e. mutmeda data are smutaneousy embedded on the same cover mage, therefore the nterference among them woud greaty mpact on the decodng process.e. Detecton reabty s aso mproved by empoyng the successve watermark/bt canceaton method resutng n reduced nterference among the embedded watermarks. The data embeddng capacty s greaty ncreased by usng borthogona waveets. Proposed SS watermarkng scheme aso offers vsua and statstca nvsbty of the hdden data. Here, the embedded watermarks are not ony mage but aso audo or vdeo cps etc. So, the reported resuts are based on mutmeda data as watermarks, whch are smutaneousy embedded over the same mage. ACKNOWLEDGEENTS Dr. Subr Kumar Sarkar acknowedges the fna assstance obtaned from the Center for obe Computng and Communcaton, Jadavpur Unversty. Internatona Scence Index, Computer and Informaton Engneerng Vo:, No:6, 007 waset.org/pubcaton/840 (a Fg. (a JPEG-000 compresson (wth orthogonaty; Securty (wth & wthout orthogonaty for mutpe messages on the stabty of the threshod vaues. In order to dehde each type of watermark propery, ths nterference has to be mnmzed. Therefore, here successve watermark canceaton as we as successve bt canceaton methods are empoyed durng the watermark recovers process for ths purpose. The resuts show that successve bt canceaton method s far better than successve watermark canceaton and norma decodng process as t greaty decreases ths nterference. VI. CONCLUSION In ths paper, we have crtcay anayzed few ssues that have sgnfcant mpact on the detecton reabty n SS watermarkng for the purpose of secure data communcaton. It s found that data embeddng n the channes (H, H 3, H 4, H 4 or H 4, H 4, H 43, H 3 of -band decomposton offers hgher resency aganst varous types of mage dstorton. Detecton reabty s mproved by ncreasng orthogonaty among code patterns usng Wash-Hadamard bass functons. (a Fg. 3 (a Successve bt and watermark canceaton on JPEG 000 compressed mage; Successve watermark canceaton (Four dfferent watermarks, N, W & E are embedded usng bor 6.8 fter and form a JPEG000 compressed mage Internatona Schoary and Scentfc Research & Innovaton ( schoar.waset.org/ /840

10 Word Academy of Scence, Engneerng and Technoogy Internatona Journa of Computer and Informaton Engneerng Vo:, No:6, 007 Internatona Scence Index, Computer and Informaton Engneerng Vo:, No:6, 007 waset.org/pubcaton/840 TABLE III RESULTS OF PSNR, SSI AND SECURITY VALUE USING BI- ORTHOGONAL WAVELET DECOPOSITION AFTER EBEDDING FOUR WATERARKS Name of the Image Fshng Boat Name of the borthogona Fter PSNR (db REFERENCES SSI Securty Vaue bor bor bor [] I. J. Cox and. L. er, A Revew of Watermarkng and the Importance of perceptua odeng, Proc of Eectronc Images, Feb [] N. Nkoads, I. Ptas, Robust Image Watermarkng n the Spata Doman, Esevs Sgna Processng, Sept. 997, pp [3] G.W. Braudaway, Protectng pubcy avaabe mages wth an nvsbe mage Watermark, Int. Conf. On Image Processng, vo. Oct [4] C.T. Hsu, J. L. Wu, Hdden sgnatures n mages, Int. Conf. On Image Process, vo. 3, Lausanne, Swtzerand, Sept [5] P. aun and A. Ivanovc, IEEE Trans on sgna processng, Apr. 003, vo. 5, pp [6] X. Nu, S. Sun, W. Xang, ut-resouton Watermarkng for Vdeo Based on Gray-eve Dgta Watermark, IEEE Trans. Consumer Eectroncs vo. 46, ay 000. [7] W. Bender, D. Gruh, N ormoto and A. Lu, Technques for Data Hdng, IB systems journa, vo. 35, pp 3-4, 996. [8] G. azzn, G. Sett and R. Rovatt, Chaotc compex spreadng sequences for asynchronous DS-CDA, IEEE Trans on Crcuts & Systems 97. [9] A. B. Watson, G. Y. Yang, J. A. Soomon, J. Vasenor, Vsbty of Waveet Quantzaton Nose, IEEE Trans on Image Processng vo. 6, August 997. [0] B. L. W. Zeng, S. Le, Eextracton of mutresouton watermark mages for resovng rghtfu ownershp, Proc. of SPIE, Securty and Watermarkng of utmeda Contents, January 999. [] I. J. Cox, J. Kan, F. T. Leghton, T. Shamoon, Secured Spread Spectrum Watermarkng for utmeda, IEEE Trans on Image Processng, vo. 6, pp 60-60, June 000. []. Ban, F. Barton and A. De, Rosa, on the performance of mutpcatve spread spectrum watermarkng, proc. on IEEE work on SP 0 [3] I. J. Cox and. L. er, and A. L. ckeps, Watermarkng as communcatons wth sde nformaton, Proc. of IEEE 99. [4] S. Craver, N. emon, B. L. Yeo and.. Yeung, Resovng Rghtfu Ownershp wth Invsbe Watermarkng Technques: Lmtatons, Attacks and Impcatons, IEEE Journa of Seected Areas n Communcatons 98. [5] J.R.Hernandez and F.Perez- Gonzaes, Statstca anayss of watermarkng schemes for copyrght protecton of mages, Proc. of IEEE, 99. [6] N. erhav, Random codng error exponents of watermarkng systems, IEEE Trans on Informaton Theory 000. [7]. Barn, F. Barton, A. Pva, Improved waveet-based watermarkng through pxe-wse maskng, IEEE Trans. on Image Processng, pp , 00. [8] W. Det, P. eerwad, A. Uh, Protecton of waveet based watermarkng systems usng fter parameterzatons, Sgna Processng. October 003. [9] D. Kundur, D. Hatznakos, Towards Robust ogo watermarkng usng mutresouton mage fuson, IEEE Trans. utmeda 6, Feb [0] P. eerwad, A. Uh, A survey of waveet-doman watermarkng agorthms, In Proc. of SPIE, Eectronc Imagng, Securty And Watermarkng of utmeda ContentsIII, CA, USA434, Jan. 00. [] Wang, Y., Doherty, J. F., VanDyck, R.E., A waveet based watermarkng agorthm for ownershp verfcaton of dgta mages, IEEE Trans. Image Process, February 00. []. K. Kundu and. Acharya, -Band Waveets: Appcaton to Texture Segmentaton for Rea Lfe Image Anayss, Proc. Internatona journa of waveets, utresouton and Informaton proceedng, vo., pp5-49, 003. [3] Phppe D., Benot., and Drk T.. S., Sgna adapted mutresouton transform for mage codng, IEEE Trans on Informaton Theory, 38(, arch 99. [4] H. S. avar and D. A. F Forenco, Improved Spread Spectrum: A new oduaton Technque for Robust Watermarkng, IEEE Trans on sgna processng, Apr 003, pp [5] A. Chouy, A Braja and S. Jourdan, Orthogona mutcarrer technques apped to drect sequence spread spectrum CDA systems, Proc of IEEE GLOBECO 93. [6] S. Hara and R. Prasad, Overvew of mutcarrer CDA, IEEE communcaton ag 97. [7] V.. Dasva and E. S. Sousa, Performance of orthogona CDA codes for quas-synchronous communcaton systems, Proc. of IEEE ICUPC 93. [8] S. Kaser, OFD-CDA vs. DS-CDA: Performance evauaton for fadng channes, Proc. of IEEE ICC 95. [9] L. Vandendorpe, uttone Spread Spectrum utpe Access Communcatons System n a utpath Rcan Fadng Channe, IEEE Trans Vehc 95. [30] N. Yee, L. Lnnartz and G. Fettwes, utcarrer CDA n Indoor Wreess Rado Networks, Proc of IEEE PIRC 93. Trtha Sankar Das became member of IEEE n 005. He receved hs B. Tech degree n Eectroncs and Teecommuncaton Engneerng from Vdyasagar Unversty, WB, Inda n 00 and.e. degree from Benga Engneerng & Scence Unversty, Shbpore n 004. At present he s a Lecturer n Eectroncs and Communcaton at Gurunanak Insttute of Technoogy, Panhat, Kokata, Inda. He s currenty dong hs Ph.D under Prof. S.K.Sarkar n Jadavpur Unversty. Hs fed of nterest spans dgta mage processng, sgna processng, communcaton and VLSI. Ayan Kumar Sau receved hs B. Tech degree n Eectroncs and Teecommuncaton from Kayan Unversty, WB, Inda n 00. At present dong hs.e. degree n Eectroncs and Tee-communcaton from Jadavpur Unversty, Inda. Hs area of nterest spans dgta mage processng, watermarkng of mutmeda data and many other chaengng probems n data hdng data and data encrypton. Dr. Subr Kumar Sarkar receved hs B. Tech. from Unversty of Cacutta, Inda n 98,. Tech. from Unversty of Cacutta, Inda n 983 and Ph. D (Tech from Insttute of Rado Physcs and Eectroncs, Unversty of Cacutta n999. From 99 to 999 he was ecturer n Benga Engneerng and Scence Unversty, Shbpore, Howrah. Currenty he s Reader n Jadavpur Unversty, Kokata, Inda, snce 999. Hs present fed of nterest s appcaton of soft computng toos n smuatons of devce modes and aso n the fed of Hgh Frequency and Low Power Consumng Devces and ther parameter optmzaton and wreess mobe communcaton. Hs research nterests aso ncude snge eectron devces and next generaton dgta eectroncs and mage processng. Internatona Schoary and Scentfc Research & Innovaton ( schoar.waset.org/ /840

Performance Analysis of MIMO SFBC CI-COFDM System against the Nonlinear Distortion and Narrowband Interference

Performance Analysis of MIMO SFBC CI-COFDM System against the Nonlinear Distortion and Narrowband Interference Performance Anayss of MIMO SFBC CI-COFDM System aganst the onnear Dstorton and arrowband Interference YSuravardhana eddy Department of ECE JTUACEAnantapur AP E-ma: suravardhana@gmacom K ama adu Department

More information

Neuro-Fuzzy Network for Adaptive Channel Equalization

Neuro-Fuzzy Network for Adaptive Channel Equalization Neuro-Fuzzy Network for Adaptve Channe Equazaton Rahb H.Abyev 1, Tayseer A-shanabeh 1 Near East Unversty, Department of Computer Engneerng, P.O. Box 670, Lefkosa, TRNC, Mersn-10, Turkey rahb@neu.edu.tr

More information

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol., No., November 23, 3-9 Rejecton of PSK Interference n DS-SS/PSK System Usng Adaptve Transversal Flter wth Condtonal Response Recalculaton Zorca Nkolć, Bojan

More information

Spread Spectrum based M-ary Modulated Robust Image Watermarking

Spread Spectrum based M-ary Modulated Robust Image Watermarking 54 IJCSS Internatonal Journal of Computer Scence and etwor Securty, VOL.7 o., October 27 Spread Spectrum based M-ary Modulated Robust Image atermarng T. S. Das, V. H. Manar 2 and S. K. Sarar 3, Dept. of

More information

A Cooperative Spectrum Sensing Scheme Based on Trust and Fuzzy Logic for Cognitive Radio Sensor Networks

A Cooperative Spectrum Sensing Scheme Based on Trust and Fuzzy Logic for Cognitive Radio Sensor Networks IJCSI Internatona Journa of Computer Scence Issues, Vo., Issue, No, January 23 ISSN (Prnt: 694-784 ISSN (Onne: 694-84 www.ijcsi.org 275 A Cooperatve Spectrum Sensng Scheme Based on Trust and Fuzzy Logc

More information

LMS Beamforming Using Pre and Post-FFT Processing for OFDM Communication Systems

LMS Beamforming Using Pre and Post-FFT Processing for OFDM Communication Systems B LMS Beamformng Usng Pre and Post-FFT Processng for OFDM Communcaton Systems Mohamed S. Heae (), Mohab A. Mangoud () and Sad Enoub (3) () Teecomm Egypt Co., Aexandra Sector, e-ma: m.shory@yahoo.com ()

More information

Low-Complexity Factor Graph Receivers for Spectrally Efficient MIMO-IDMA

Low-Complexity Factor Graph Receivers for Spectrally Efficient MIMO-IDMA Low-Compexty Factor Graph Recevers for Spectray Effcent MIMO-IDMA Cemens Nova, Franz Hawatsch, and Gerad Matz Insttute of Communcatons and Rado-Frequency Engneerng, Venna Unversty of Technoogy Gusshausstrasse

More information

A Non-cooperative Game Theoretic Approach for Multi-cell OFDM Power Allocation Ali Elyasi Gorji 1, Bahman Abolhassani 2 and Kiamars Honardar 3 +

A Non-cooperative Game Theoretic Approach for Multi-cell OFDM Power Allocation Ali Elyasi Gorji 1, Bahman Abolhassani 2 and Kiamars Honardar 3 + 29 Internatona Symposum on Computng, Communcaton, and Contro (ISCCC 29 Proc.of CSIT vo. (2 (2 IACSIT Press, Sngapore A Non-cooperatve Game Theoretc Approach for Mut-ce OFDM Power Aocaton A Eyas Gorj, Bahman

More information

Phasor Representation of Sinusoidal Signals

Phasor Representation of Sinusoidal Signals Phasor Representaton of Snusodal Sgnals COSC 44: Dgtal Communcatons Instructor: Dr. Amr Asf Department of Computer Scence and Engneerng York Unversty Handout # 6: Bandpass odulaton Usng Euler dentty e

More information

Definition of level and attenuation in telephone networks

Definition of level and attenuation in telephone networks Defnton of eve and attenuaton n teephone networks o The purpose: defnton of the measurement unts used for sgna eve and crcut gan/attenuaton n teephony; defnton of the reference ponts empoyed n teephone

More information

A study of turbo codes for multilevel modulations in Gaussian and mobile channels

A study of turbo codes for multilevel modulations in Gaussian and mobile channels A study of turbo codes for multlevel modulatons n Gaussan and moble channels Lamne Sylla and Paul Forter (sylla, forter)@gel.ulaval.ca Department of Electrcal and Computer Engneerng Laval Unversty, Ste-Foy,

More information

Impact of Interference Model on Capacity in CDMA Cellular Networks. Robert Akl, D.Sc. Asad Parvez University of North Texas

Impact of Interference Model on Capacity in CDMA Cellular Networks. Robert Akl, D.Sc. Asad Parvez University of North Texas Impact of Interference Model on Capacty n CDMA Cellular Networks Robert Akl, D.Sc. Asad Parvez Unversty of North Texas Outlne Introducton to CDMA networks Average nterference model Actual nterference model

More information

WELDING DEFECT PATTERN RECOGNITION IN RADIOGRAPHIC IMAGES OF GAS PIPELINES USING ADAPTIVE FEATURE EXTRACTION METHOD AND NEURAL NETWORK CLASSIFIER

WELDING DEFECT PATTERN RECOGNITION IN RADIOGRAPHIC IMAGES OF GAS PIPELINES USING ADAPTIVE FEATURE EXTRACTION METHOD AND NEURAL NETWORK CLASSIFIER 23 rd Word Gas Conference, Amsterdam 2006 WELDING DEFECT PATTERN RECOGNITION IN RADIOGRAPHIC IMAGES OF GAS PIPELINES USING ADAPTIVE FEATURE EXTRACTION METHOD AND NEURAL NETWORK CLASSIFIER Man author S.

More information

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,

More information

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation 1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected

More information

User Based Resource Scheduling for Heterogeneous Traffic in the Downlink of OFDM Systems

User Based Resource Scheduling for Heterogeneous Traffic in the Downlink of OFDM Systems G. Indumath S. Vjayaran K. Murugesan User Based Resource Schedung for Heterogeneous Traffc n the Downn of OFDM Systems INDUMATHI.G VIJAYARANI.S Department of ECE Mepco Schen Engneerng Coege Svaas INDIA.

More information

Tamper Localization in Wavelet Domain Using Semi- Fragile Watermarking

Tamper Localization in Wavelet Domain Using Semi- Fragile Watermarking Tamper Localzaton n Wavelet Doman Usng Sem- Fragle Watermarkng Sandpbha Mangrolya, Ketk Pathak Departement of Electroncs and Communcaton Engneerng Sarvajank College of Engneerng & Technology, Surat Abstract

More information

An Efficient Blind Watermarking Method based on Significant Difference of Wavelet Tree Quantization using Adaptive Threshold

An Efficient Blind Watermarking Method based on Significant Difference of Wavelet Tree Quantization using Adaptive Threshold Internatonal Journal of Electroncs and Electrcal Engneerng Vol., No., June 3 An Effcent Blnd ng Method based on Sgnfcant Dfference of Wavelet Tree Quantzaton usng Adaptve Threshold Then Huynh The Unversty

More information

Optimal and water-filling Algorithm approach for power Allocation in OFDM Based Cognitive Radio System

Optimal and water-filling Algorithm approach for power Allocation in OFDM Based Cognitive Radio System Internatona Journa of Engneerng Research and Technoogy. ISS 0974-3154 Voume 10, umber 1 (017) Internatona Research Pubcaton House http://www.rphouse.com Optma and water-fng Agorthm approach for power Aocaton

More information

Cooperative Wireless Multicast: Performance Analysis and Power/Location Optimization

Cooperative Wireless Multicast: Performance Analysis and Power/Location Optimization 88 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO. 6, JUNE Cooperatve Wreess Mutcast: Performance Anayss and Power/Locaton Optmzaton H. Vcky Zhao, Member, IEEE, and Wefeng Su, Member, IEEE Abstract

More information

MIMO Schemes In UTRA LTE, A Comparison

MIMO Schemes In UTRA LTE, A Comparison MIMO Schemes In UA LE A Comparson Chrstoph Spege 1 Jens Berkmann Zjan Ba 1 obas Schoand 3 Chrstan Drewes Gudo. Bruck 1 Bertram Gunzemann Peter Jung 1 1 Unverstät Dusburg-Essen Lehrstuh für Kommunkatonsechnk

More information

UWB & UWB Channels HANI MEHRPOUYAN

UWB & UWB Channels HANI MEHRPOUYAN UWB & UWB Channes HANI MEHRPOUYAN Abstract Utra Wde Band (UWB) sgnang s expected to pay an mportant roe n the future of communcatons systems. UWB uses extremey wde transmsson bandwdths (n excess of 3 GHz),

More information

Evaluation of Kolmogorov - Smirnov Test and Energy Detector Techniques for Cooperative Spectrum Sensing in Real Channel Conditions

Evaluation of Kolmogorov - Smirnov Test and Energy Detector Techniques for Cooperative Spectrum Sensing in Real Channel Conditions Tefor Journa Vo. 7 No. 05. 3 Evauaton of Komogorov - Smrnov Test and Energy Detector Technques for Cooperatve Spectrum Sensng n Rea Channe Condtons Deman Lekomtcev Student ember IEEE and Roman arsaek ember

More information

antenna antenna (4.139)

antenna antenna (4.139) .6.6 The Lmts of Usable Input Levels for LNAs The sgnal voltage level delvered to the nput of an LNA from the antenna may vary n a very wde nterval, from very weak sgnals comparable to the nose level,

More information

Digital Transmission

Digital Transmission Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal

More information

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme Proceedngs of the World Congress on Engneerng 2011 Vol II, July 6-8, 2011, London, U.K. Inverse Halftonng Method Usng Pattern Substtuton Based Data Hdng Scheme Me-Y Wu, Ja-Hong Lee and Hong-Je Wu Abstract

More information

Performance Analysis of an Enhanced DQRUMA/MC-CDMA Protocol with an LPRA Scheme for Voice Traffic

Performance Analysis of an Enhanced DQRUMA/MC-CDMA Protocol with an LPRA Scheme for Voice Traffic Performance Anayss of an Enhanced DQRUA/C-CDA Protoco wth an LPRA Scheme for Voce Traffc Jae Yoon Park Korea Teecom R&D Group, Woomyun-dong 17, Seou, 137-792, Korea Seung Yeob Nam Dept. of EECS, KAIST,

More information

LS-SVM Based WSN Location Algorithm in NLOS Environments

LS-SVM Based WSN Location Algorithm in NLOS Environments 06 6 th Internatona Conference on Informaton echnoogy for Manufacturng Systems (IMS 06 ISB: 978--60595-353-3 LS-SVM Based WS Locaton Agorthm n LOS Envronments Hongyan Zhang, Zheng Lu, Bwen Wang Unversty

More information

THE third Generation Partnership Project (3GPP) has finalized

THE third Generation Partnership Project (3GPP) has finalized 3 8th Internatona Conference on Communcatons and Networkng n Chna (CHINACOM MU-MIMO User Parng Agorthm to Acheve Overhead-Throughput Tradeoff n LTE-A Systems Yng Wang, Fe Peng, Wedong Zhang, Yuan Yuan

More information

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com

More information

29 th NATIONAL RADIO SCIENCE CONFERENCE (NRSC 2012) April 10-12, 2012, Faculty of Engineering/Cairo University, Egypt

29 th NATIONAL RADIO SCIENCE CONFERENCE (NRSC 2012) April 10-12, 2012, Faculty of Engineering/Cairo University, Egypt Apr 10-1, 01, Facuty of Engneerng/Caro Unversty, Egypt Combned Coaboratve and Precoded MIMO for Upnk of the LTE-Advanced Karm A. Banawan 1, Essam A. Sourour 1 Facuty of Engneerng, Unversty of Aexandra,

More information

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding Sde-Match Vector Quantzers Usng Neural Network Based Varance Predctor for Image Codng Shuangteng Zhang Department of Computer Scence Eastern Kentucky Unversty Rchmond, KY 40475, U.S.A. shuangteng.zhang@eku.edu

More information

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht 68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly

More information

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University Dynamc Optmzaton Assgnment 1 Sasanka Nagavall snagaval@andrew.cmu.edu 16-745 January 29, 213 Robotcs Insttute Carnege Mellon Unversty Table of Contents 1. Problem and Approach... 1 2. Optmzaton wthout

More information

Efficient Power Allocation for LDPC-Coded MIMO Systems

Efficient Power Allocation for LDPC-Coded MIMO Systems Effcent Power Aocaton for LDPC-Coded MIMO Systems Laya A Sd. shan Rao & M. Sushanth Ba Vaagdev Coege of Engneerng Waranga -50600 Jawahara ehru Technoogca Unversty yderaad Inda E-ma: ayaq0786@gma.com prof_r@redffma.com

More information

Revision of Lecture Twenty-One

Revision of Lecture Twenty-One Revson of Lecture Twenty-One FFT / IFFT most wdely found operatons n communcaton systems Important to know what are gong on nsde a FFT / IFFT algorthm Wth the ad of FFT / IFFT, ths lecture looks nto OFDM

More information

High Speed, Low Power And Area Efficient Carry-Select Adder

High Speed, Low Power And Area Efficient Carry-Select Adder Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs

More information

Calculation of the received voltage due to the radiation from multiple co-frequency sources

Calculation of the received voltage due to the radiation from multiple co-frequency sources Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons

More information

DISTINCT IMAGE FUSION METHODS FOR LANDSLIDE INFORMATION ENHANCEMENT

DISTINCT IMAGE FUSION METHODS FOR LANDSLIDE INFORMATION ENHANCEMENT DISTINCT IMAGE FUSION METHODS FOR LANDSLIDE INFORMATION ENHANCEMENT J.Wang a,b, a *, J.X.Zhang, Z.J.Lu a a Insttute of Photogrammetry & Remote Sensng, CASM, Bejng, Chna - stecsm@publc.bta.net.cn b Department

More information

Double-lock for image encryption with virtual optical wavelength

Double-lock for image encryption with virtual optical wavelength Double-lock for mage encrypton wth vrtual optcal wavelength Xang Peng Natonal Laboratory of Precson Measurement Technology and Instrumentaton, Tanjn Unversty, 30007 Tanjn, Chna Lngfeng Yu, and Llong Ca

More information

IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING

IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING U.P.B. Sc. Bull., Seres C, Vol. 77, Iss. 4, 015 ISSN 86-3540 IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING Radu Ovdu PREDA 1, Ioana MARCU, Amela CIOBANU 3 In ths paper a novel

More information

Optimal Placement of Sectionalizing Switches in Radial Distribution Systems by a Genetic Algorithm

Optimal Placement of Sectionalizing Switches in Radial Distribution Systems by a Genetic Algorithm K. Kneam and S. Srsumrannuku / GMSARN Internatona Journa 2 (2008) 2-28 Optma Pacement of Sectonazng Swtches n Rada Dstrbuton Systems by a Genetc Agorthm K. Kneam and S. Srsumrannuku Abstract Proper nstaaton

More information

A Multi-standard Efficient Column-layered LDPC Decoder for Software Defined Radio on GPUs

A Multi-standard Efficient Column-layered LDPC Decoder for Software Defined Radio on GPUs 203 IEEE 4th Workshop on Sgna Processng Advances n Wreess Communcatons (SPAWC) A Mut-standard Effcent Coumn-ayered LDPC Decoder for Software Defned Rado on GPUs Rongchun L, Je Zhou, Yong Dou, Song Guo,

More information

BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS

BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS Jonathan Me Carnege Mellon Unversty Department of Electrcal & Computer Engneerng Pttsburgh, PA 523 jme@cmu.edu Scott Pudlewsk Lncoln

More information

Adaptive Modulation for Multiple Antenna Channels

Adaptive Modulation for Multiple Antenna Channels Adaptve Modulaton for Multple Antenna Channels June Chul Roh and Bhaskar D. Rao Department of Electrcal and Computer Engneerng Unversty of Calforna, San Dego La Jolla, CA 993-7 E-mal: jroh@ece.ucsd.edu,

More information

Design and Implementation of a Sort Free K-Best Sphere Decoder

Design and Implementation of a Sort Free K-Best Sphere Decoder Desgn and Impementaton of a Sort Free K-Best Sphere Decoder Sudp Monda, Ahmed Etaw, Member, IEEE, Chung-An Shen, and Khaed N. Saama, Member, IEEE. Abstract:- Ths paper descrbes the desgn and VLSI archtecture

More information

A High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode

A High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode A Hgh-Senstvty Oversamplng Dgtal Sgnal Detecton Technque for CMOS Image Sensors Usng Non-destructve Intermedate Hgh-Speed Readout Mode Shoj Kawahto*, Nobuhro Kawa** and Yoshak Tadokoro** *Research Insttute

More information

A New Statistical Detector for CT-Based Multiplicative Image Watermarking Using the t Location-Scale Distribution

A New Statistical Detector for CT-Based Multiplicative Image Watermarking Using the t Location-Scale Distribution 9th Internatonal Conference on Informaton and Knowledge Technology (IKT 07) October 8 & 9, 07, Amrkabr Unversty of Technology A ew Statstcal Detector for CT-Based Multplcatve Image Watermarkng Usng the

More information

New Wavelet Based Performance Analysis and Optimization of Scalable Joint Source/Channel Coder (SJSCC & SJSCCN) for Time-Varying Channels.

New Wavelet Based Performance Analysis and Optimization of Scalable Joint Source/Channel Coder (SJSCC & SJSCCN) for Time-Varying Channels. Internatonal Research Journal of Engneerng and Technology (IRJET) e-issn: 2395-0056 Volume: 02 Issue: 09 DEC-205 p-issn: 2395-0072 www.rjet.net New Wavelet Based Performance Analyss and Optmzaton of Scalable

More information

Chaotic Filter Bank for Computer Cryptography

Chaotic Filter Bank for Computer Cryptography Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College

More information

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department

More information

Review: Our Approach 2. CSC310 Information Theory

Review: Our Approach 2. CSC310 Information Theory CSC30 Informaton Theory Sam Rowes Lecture 3: Provng the Kraft-McMllan Inequaltes September 8, 6 Revew: Our Approach The study of both compresson and transmsson requres that we abstract data and messages

More information

Recurrent Neural Network Based Fuzzy Inference System for Identification and Control of Dynamic Plants

Recurrent Neural Network Based Fuzzy Inference System for Identification and Control of Dynamic Plants Word Academy of Scence, Engneerng and Technoogy Internatona Journa of Computer and Informaton Engneerng Vo, No7, 007 Recurrent Neura Network Based Fuzzy Inference System for Identfcaton and Contro of Dynamc

More information

Full-Duplex Device-to-Device Collaboration for Low-Latency Wireless Video Distribution

Full-Duplex Device-to-Device Collaboration for Low-Latency Wireless Video Distribution Fu-Dupex Devce-to-Devce Coaboraton for Low-Latency Wreess Vdeo Dstrbuton Mansour Nascheragh 1, Member, IEEE Seyed A Ghorash 1,2, Senor Member, IEEE, Mohammad Shkh-Bahae 3, Senor Member, IEEE 1. Department

More information

Performance Comparison of RS Code and Turbo Codes for Optical Communication

Performance Comparison of RS Code and Turbo Codes for Optical Communication Internatona Journa of Eectroncs Engneerng, (), 0, pp. 5 56 Seras Pubcatons, ISSN : 097-78 Performance Comparson of RS Code and Turbo Codes for Optca Communcaton Reena Tyag, Puneet Chandra Srvastava, Mahendra

More information

Robust Block Selection for Watermarking Video Streams

Robust Block Selection for Watermarking Video Streams Proceedngs of the World Congress on Engneerng 8 Vol I WCE 8, July - 4, 8, London, U.K. Robust Block Selecton for Watermarkng Vdeo Streams Tamás Polyák, Gábor Fehér Abstract In ths paper a robust vdeo atermarkng

More information

Estimation of Critical Performance and Optimization of Scalable Joint Source/Channel Coder (SJSCC) For Time Varying Channels

Estimation of Critical Performance and Optimization of Scalable Joint Source/Channel Coder (SJSCC) For Time Varying Channels Proceedngs of the Internatonal MultConference of Engneers and Computer Scentsts 8 Vol II IMECS 8, 9- March, 8, Hong ong Estmaton of Crtcal Performance and Optmzaton of Scalable Jont Source/ Coder (SJSCC)

More information

Dynamic Resource Control for High-Speed Downlink Packet Access Wireless Channel

Dynamic Resource Control for High-Speed Downlink Packet Access Wireless Channel MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.mer.com Dynamc Resource Contro for Hgh-Speed Downn Pacet Access Wreess Channe Hua-Rong Shao, Cha Shen, Daqng Gu, Jnyun Zhang, Php Or TR2003-60 May 2003

More information

Space Time Equalization-space time codes System Model for STCM

Space Time Equalization-space time codes System Model for STCM Space Tme Eualzaton-space tme codes System Model for STCM The system under consderaton conssts of ST encoder, fadng channel model wth AWGN, two transmt antennas, one receve antenna, Vterb eualzer wth deal

More information

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System Int. J. Communcatons, Network and System Scences, 10, 3, 1-5 do:10.36/jcns.10.358 Publshed Onlne May 10 (http://www.scrp.org/journal/jcns/) The Performance Improvement of BASK System for Gga-Bt MODEM Usng

More information

Application of Intelligent Voltage Control System to Korean Power Systems

Application of Intelligent Voltage Control System to Korean Power Systems Applcaton of Intellgent Voltage Control System to Korean Power Systems WonKun Yu a,1 and HeungJae Lee b, *,2 a Department of Power System, Seol Unversty, South Korea. b Department of Power System, Kwangwoon

More information

A Data-Driven Robustness Algorithm for the Internet of Things in Smart Cities

A Data-Driven Robustness Algorithm for the Internet of Things in Smart Cities Emergng Trends, Issues, and Chaenges n Bg Data and Its Impementaton toward Future Smart Ctes A Data-Drven Robustness Agorthm for the Internet of Thngs n Smart Ctes Te Qu, Je Lu, Wesheng S, Mn Han, Huansheng

More information

Steganography in JPEG2000 Compressed Images

Steganography in JPEG2000 Compressed Images 824 IEEE Transactons on Consumer Electroncs, Vol. 49, No. 4, NOVEMBER 2003 Steganography n JPEG2000 Compressed Images Po-Chy Su and C.-C. Jay Kuo, Fellow, IEEE Abstract Informaton hdng n JPEG2000 compressed

More information

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty

More information

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985 NATONAL RADO ASTRONOMY OBSERVATORY Green Bank, West Vrgna SPECTRAL PROCESSOR MEMO NO. 25 MEMORANDUM February 13, 1985 To: Spectral Processor Group From: R. Fsher Subj: Some Experments wth an nteger FFT

More information

ACTIVE CONTROL ANALYSIS OF MINING VEHICLE CABIN NOISE USING FINITE ELEMENT MODELLING

ACTIVE CONTROL ANALYSIS OF MINING VEHICLE CABIN NOISE USING FINITE ELEMENT MODELLING ACTIVE CONTROL ANALYSIS OF MINING VEHICLE CABIN NOISE USING FINITE ELEMENT MODELLING D.A. Stanef, C.H. Hansen and R.C. Morgans Actve Nose and Vbraton Contro Group, Department of Mechanca Engneerng, The

More information

FULL-Duplex (FD) transceivers are known for their capability

FULL-Duplex (FD) transceivers are known for their capability ardware Imparments Aware Transcever Desgn for Bdrectona Fu-Dupex MIMO OFDM Systems Omd Taghzadeh, Vma Radharshnan, A Cagatay Cr, Member, IEEE, Rudof Mathar, Senor Member, IEEE, Lutz Lampe Senor Member,

More information

ANNUAL OF NAVIGATION 11/2006

ANNUAL OF NAVIGATION 11/2006 ANNUAL OF NAVIGATION 11/2006 TOMASZ PRACZYK Naval Unversty of Gdyna A FEEDFORWARD LINEAR NEURAL NETWORK WITH HEBBA SELFORGANIZATION IN RADAR IMAGE COMPRESSION ABSTRACT The artcle presents the applcaton

More information

The Application of Interpolation Algorithms in OFDM Channel Estimation

The Application of Interpolation Algorithms in OFDM Channel Estimation The Applcaton of Interpolaton Algorthms n OFDM Estmaton Xjun ZHANG 1,, Zhantng YUAN 1, 1 School of Electrcal and Informaton Engneerng, Lanzhou Unversty of Technology, Lanzhou, Gansu 730050, Chna School

More information

An Improved Algorithm of Successive Interference Cancellation for STC-OFDM Systems

An Improved Algorithm of Successive Interference Cancellation for STC-OFDM Systems Sensors & ransucers Vo. 66 Issue 3 March 04 pp. 5-55 Sensors & ransucers 04 by IFS Pubshng S. L. http://www.sensorsporta.com n Improve gorthm of Successve Interference Canceaton for SC-OFDM Systems We

More information

Implementation of Digital Filters in Carry-Save Residue Number System

Implementation of Digital Filters in Carry-Save Residue Number System Impementaton of Dgta Fters n Carry-Save Resdue Number System Andrea De Re, Aberto Nannare and Marco Re Department of Eectrca Engneerng Unversty of Rome "Tor Vergata" - Itay http://dspvs.unroma2.t/ Abstract

More information

A Novel GNSS Weak Signal Acquisition Using Wavelet Denoising Method

A Novel GNSS Weak Signal Acquisition Using Wavelet Denoising Method A Novel GNSS Weak Sgnal Acquston Usng Wavelet Denosng Method Jn Tan, Lu Yang, BeHang Unversty, P.R.Chna BIOGRAPHY Jn Tan s a post-doctor n School of Electronc and Informaton Engneerng, BeHang Unversty,

More information

Robust Image Transmission Performed by SPIHT and Turbo-Codes

Robust Image Transmission Performed by SPIHT and Turbo-Codes SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 5, No.2, November 2008, 353-360 Robust Image Transmsson Performed by SPIHT and Turbo-Codes Abdelmounam Moulay Lakhdar, Rachda Mélan 2, Malka Kandouc 2 Abstract:

More information

DESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER

DESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER DESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER Ha-Nam Nguyen, Danel Menard, and Olver Senteys IRISA/INRIA, Unversty of Rennes, rue de Kerampont F-3 Lannon Emal: hanguyen@rsa.fr ABSTRACT To satsfy energy

More information

A Spreading Sequence Allocation Procedure for MC-CDMA Transmission Systems

A Spreading Sequence Allocation Procedure for MC-CDMA Transmission Systems A Spreadng Sequence Allocaton Procedure for MC-CDMA Transmsson Systems Davd Motter, Damen Castelan Mtsubsh Electrc ITE 80, Avenue des Buttes de Coësmes, 35700 Rennes FRAE e-mal: {motter,castelan}@tcl.te.mee.com

More information

Learning Ensembles of Convolutional Neural Networks

Learning Ensembles of Convolutional Neural Networks Learnng Ensembles of Convolutonal Neural Networks Lran Chen The Unversty of Chcago Faculty Mentor: Greg Shakhnarovch Toyota Technologcal Insttute at Chcago 1 Introducton Convolutonal Neural Networks (CNN)

More information

LOCAL DECODING OF WALSH CODES TO REDUCE CDMA DESPREADING COMPUTATION

LOCAL DECODING OF WALSH CODES TO REDUCE CDMA DESPREADING COMPUTATION LOCAL DECODING OF WALSH CODES TO REDUCE CDMA DESPREADING COMPUTATION Albert M. Chan, Jon Feldman, and Raghu Madyastha (Vanu, Inc., Cambrdge, MA, USA, {chanal,jonfeld,raghu}@vanu.com); Potr Indyk and Davd

More information

Interference Analysis in Time and Frequency Asynchronous Network MIMO OFDM Systems

Interference Analysis in Time and Frequency Asynchronous Network MIMO OFDM Systems Interference Anayss n Tme and Frequency Asynchronous etwork MIMO OFDM Systems Vncent Kotzsch and Gerhard Fettwes Vodafone Char Mobe Communcatons Systems, TU-Dresden, Germany Ema: {vncent.kotzsch, fettwes}@fn.et.tu-dresden.de

More information

NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION

NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION Phaneendra R.Venkata, Nathan A. Goodman Department of Electrcal and Computer Engneerng, Unversty of Arzona, 30 E. Speedway Blvd, Tucson, Arzona

More information

Wideband Spectrum Sensing by Compressed Measurements

Wideband Spectrum Sensing by Compressed Measurements Wdeband Spectrum Sensng by Compressed Measurements Davood Mardan Najafabad Department of Electrcal Engneerng Yazd Unversty Emal: d.mardan@stu.yazdun.ac.r Al A. Tadaon Department of Electrcal Engneerng

More information

The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game

The Spectrum Sharing in Cognitive Radio Networks Based on Competitive Price Game 8 Y. B. LI, R. YAG, Y. LI, F. YE, THE SPECTRUM SHARIG I COGITIVE RADIO ETWORKS BASED O COMPETITIVE The Spectrum Sharng n Cogntve Rado etworks Based on Compettve Prce Game Y-bng LI, Ru YAG., Yun LI, Fang

More information

Joint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding

Joint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding Communcatons and Network, 2013, 5, 312-318 http://dx.do.org/10.4236/cn.2013.53b2058 Publshed Onlne September 2013 (http://www.scrp.org/journal/cn) Jont Power Control and Schedulng for Two-Cell Energy Effcent

More information

Optimized Forwarding for Wireless Sensor Networks by Fuzzy Inference System

Optimized Forwarding for Wireless Sensor Networks by Fuzzy Inference System Optmzed Forwardng for Wreess Sensor Networs by Fuzzy Inference System Mohammad Abdu Azm and Abbas Jamapour Schoo of Eectrca and Informaton Engneerng The Unversty of Sydney, NSW 6, Austraa {azm, abbas}@ee.usyd.edu.au

More information

Improved Error Detection in the JPEG2000 Codec

Improved Error Detection in the JPEG2000 Codec Improved Error Detecton n the JPEG2000 Codec Farzad Zargar, Member, IEEE, Al Sefdpour, M. Shahram Mon, Member, IEEE, and Mohammad Ghanbar, Fellow, IEEE Abstract the Segmentaton symbol s an error reslence

More information

A Novel and Secure technique for image. Steganography using DWT

A Novel and Secure technique for image. Steganography using DWT Internatonal Journal of Computer Technology and Electroncs Engneerng (IJCTEE) Volume 3 Issue 5 October 2013 A Novel and Secure technque for mage Abstract: Steganography s the art and scence of hdng nformaton

More information

Error Probability of RS Code Over Wireless Channel

Error Probability of RS Code Over Wireless Channel Internatonal Journal of Electroncs Engneerng, 3 (), 11, pp. 99 33 Serals Publcatons, ISS : 973-7383 Error Probablty of RS Code Over Wreless Channel Mohammad Aftab Alam Khan 1 & Mehwash Farooq 1 1 Department

More information

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,

More information

986 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 33, NO. 5, MAY 2015

986 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 33, NO. 5, MAY 2015 986 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 33, NO. 5, MAY 2015 Bayesan Herarchca Mechansm Desgn for Cogntve Rado Networks Yong Xao, Member, IEEE, Zhu Han, Feow, IEEE, Kwang-Cheng Chen,

More information

A ph mesh refinement method for optimal control

A ph mesh refinement method for optimal control OPTIMAL CONTROL APPLICATIONS AND METHODS Optm. Contro App. Meth. (204) Pubshed onne n Wey Onne Lbrary (weyonnebrary.com)..24 A ph mesh refnement method for optma contro Mchae A. Patterson, Wam W. Hager

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

Fast Code Detection Using High Speed Time Delay Neural Networks

Fast Code Detection Using High Speed Time Delay Neural Networks Fast Code Detecton Usng Hgh Speed Tme Delay Neural Networks Hazem M. El-Bakry 1 and Nkos Mastoraks 1 Faculty of Computer Scence & Informaton Systems, Mansoura Unversty, Egypt helbakry0@yahoo.com Department

More information

DESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER

DESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER 7th European Sgnal Processng Conference (EUSIPCO 9) Glasgow, Scotland, August -8, 9 DESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER Ha-Nam Nguyen, Danel Menard, and Olver Senteys IRISA/INRIA, Unversty of

More information

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957

More information

Reduced Cluster Search ML Decoding for QO-STBC Systems

Reduced Cluster Search ML Decoding for QO-STBC Systems Reduced Cluster Search ML Decodng for QO-STBC Systems Isaque Suzuk, Taufk Abrão Dept. of Electrcal Engneerng State Unversty of Londrna 8605-990, PR, Brazl taufk@uel.br Bruno A. Angélco, Fernando Craco

More information

Malicious User Detection in Spectrum Sensing for WRAN Using Different Outliers Detection Techniques

Malicious User Detection in Spectrum Sensing for WRAN Using Different Outliers Detection Techniques Malcous User Detecton n Spectrum Sensng for WRAN Usng Dfferent Outlers Detecton Technques Mansh B Dave #, Mtesh B Nakran #2 Assstant Professor, C. U. Shah College of Engg. & Tech., Wadhwan cty-363030,

More information

MIMO-OFDM Systems. Team Telecommunication and Computer Networks, FSSM, University Cadi Ayyad, P.O. Box 2390, Marrakech, Morocco.

MIMO-OFDM Systems. Team Telecommunication and Computer Networks, FSSM, University Cadi Ayyad, P.O. Box 2390, Marrakech, Morocco. IJCSI Internatonal Journal of Computer Scence Issues, Vol. 8, Issue 3, ay 2011 ISSN (Onlne: 1694-0814 A Low-complexty Power and Bt Allocaton Algorthm for ultuser IO-OFD Systems Ayad Habb 1, Khald El Baamran

More information

HIGH PERFORMANCE ADDER USING VARIABLE THRESHOLD MOSFET IN 45NM TECHNOLOGY

HIGH PERFORMANCE ADDER USING VARIABLE THRESHOLD MOSFET IN 45NM TECHNOLOGY Internatonal Journal of Electrcal, Electroncs and Computer Systems, (IJEECS) HIGH PERFORMANCE ADDER USING VARIABLE THRESHOLD MOSFET IN 45NM TECHNOLOGY 1 Supryo Srman, 2 Dptendu Ku. Kundu, 3 Saradndu Panda,

More information

A MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS

A MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS A MODIFIED DIFFERENTIAL EVOLUTION ALORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS Kaml Dmller Department of Electrcal-Electroncs Engneerng rne Amercan Unversty North Cyprus, Mersn TURKEY kdmller@gau.edu.tr

More information

Naveen Kumar Sharma et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (2), 2011,

Naveen Kumar Sharma et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 2 (2), 2011, Naveen umar Sharma et a, / (IJCSIT Internatona Journa of Computer Scence and Informaton Technooges, Vo. (, 0, 9-945 Performance Evauaton Anayss of MLP & DG-RBF Feed Forward Neura Networs for Pattern Cassfcaton

More information

Cooperative Connectivity Models and Bounds. for Wireless Relay Networks

Cooperative Connectivity Models and Bounds. for Wireless Relay Networks Cooperatve Connectvty Modes and Bounds for Wreess Reay Networs John Boyer B. Eng. M. A. c. A thess submtted to he Facuty of Graduate tudes and Research In parta fufment of the requrements for the degree

More information