communications are increasingly used in a way that they are scrambling and the combination of scrambling frequency and time domain.

Size: px
Start display at page:

Download "communications are increasingly used in a way that they are scrambling and the combination of scrambling frequency and time domain."

Transcription

1 Journal of Advances n Computer Research Quarterly pissn: x eissn: Sar Branch, Islamc Azad Unversty, Sar, I.R.Iran (Vol. 7, No. 3, August 2016), Pages: Audo Sgnal Encrypton Based on Permutaton Relatons and Resd due Number System Fereshteh Ghanbar Adv, Mohammad Mehrna M.Sc. Computer Systems Archtecture, Dezfoul Branch, Islamc Azad Unversty, Dezfoul, Iran qermezkon@gmal.comm Receved: 2016/02/28; Accepted: 2016/05/14 Abstract Ths paper presentss a new audo encrypton algorthm based on permutaton and resdue number system. In the current approach, sgnal samples are combned wth resdue number system through permutaton; therefore, a specfc nose s generated. Then, the audo sgnal s combned wth the nose, generated by the algorthm, to produce a slencee sgnal. For ths purpose, the algorthm uses a predefned permutaton format and a modular set n the form of {2 n -1, 2 n, 2 n +1} to encrypt the man sgnal. Consequently, the proposed algorthm converts the nput sgnal nto a slence sgnal and ncreases ts securty. The sgnal-to-nose very low values of rato (SNR) was used to evaluate the algorthm. The results ndcated SNR pertanng to audo sgnals n the proposed method. Keywords: Encrypton, Decrypton, Permutaton SNR, Resdue Number System, Audo Sgnal, 1. Introducton Voce s the ablty to speak or the act of speakng. An audo sgnal s comprsed of a number of bts. Ths sgnal contans postve and negatve values. Audo communcatons are ncreasngly used n a way that they are becomng more vulnerable; therefore, t s really necessary to provde them wth more securty. Varous encrypton algorthms are used to provde the securty of audo sgnals. In ths regard, there are fve general encrypton methods such as scrambl lng tme doman, scramblng ampltude, 2D scramblng and the combnaton of scramblng frequency and tme doman. An audo sgnal s encrypted n dgtal or analog formats [1]. Generally, the objectve of speech encrypton s to perform some reversble operatons on a pece of speech n a way that t wll be totally ncomprehensble to an unautho orzed lstener. Threee mportant crtera for ratng encrypton algorthms are as follows: The ablty of algorthm to generate an encrypted speech whose comprehensble resdue s lttle. The effectveness of encrypton and decrypton retreved nformaton on the sde of the desred recpent. The securty of algorthm aganst cryptanalyss attacks processs on the qualty of 67

2 Audo Sgnal Encrypton Based on F. Ghanbar Adv, M. Mehrna The problem that encrypton experts are faced wth s to desgn encrypton systems that dstort speech sgnals havng so much redundancy that t would be mpossble to retreve useful nformaton from them. Usng a predefned permutaton mechansm and a resdue number system wth modules n such a format as {2 n -1, 2 n, 2 n +1}, the proposed approach encrypts audo sgnals. The encrypted sgnal wll be lke a slence sgnal wth no loss of qualty durng decrypton. Employng the proposed algorthm, audo fles can be encrypted n order to save audo messages and transmt them on the Internet. Ths system has two promnent advantages. Frst, the encrypted sgnal wll be heard lke a slence sgnal. The second advantage s that relocatng modules, changng ther values, and changng the permutaton pattern can result n so many states n the encrypton algorthm. Usng SNR, the proposed algorthm was evaluated. It presented a hgh level of securty wth approprate qualty. The current paper s organzed as follows: Secton 2 presents an ntroducton to the resdue number system. In Secton 3, some nstances of the prevous algorthms are presented on voce encrypton. The encrypton process s explaned n Secton 4. The results of analyzng and evaluatng the performance of the algorthm are presented n Secton 5. Fnally, the concluson s dscussed n Secton Resdue Number System The resdue number system s a non-weghted and unconventonal number system that supports parallel computatons, the lmted dstrbuton of carry, low power consumpton, and secure communcatons. It s used n applcatons employng addton, multplcaton, subtracton, and multplcaton by a range of numbers. The resdue number system s characterzed wth a set of modules. If all the modules are co-prme, the system s optmal. The hybrd of other systems can be used to optmze ths system so that the selecton of modular sets would become easer, and the dsplay range extended. For ths purpose, the hybrd of the resdue number system, multlevel resdue number system, and the Van Hunt resdue number system can be employed. Moreover, t s suggested that the redundant resdue system be used to establsh and ncrease system securty. The resdue number system s characterzed wth a set of modules lke {m 1, m 2,, m n } n whch all the modules are postve ntegers. If all n modules are co-prme, the system has the largest possble dsplay range equal to [α, α+m) n whch α s an nteger and M s calculated as follows: = n M m (1) =1 The nteger X (α X < α + M) s a unque representaton n the resdue number system. It s ndcated wth a set of remanders lke (x 1, x 2, x 3,, x n ) n a way that: x = X mod m, = 1,2,..., n (2) Usng the Chnese Remander Theorem, X s obtaned on the remander set {m 1, m 2,,m n } as follows: n n = 1 ( ) X = ( xn M ) (3) m m 68

3 Journal of Advances n Computer Research (Vol. 7, No. 3, August 2016) = n M m (4) =1 M 1 M = N = ( M ) = 123 K n m m In whch s defned as the multplcatve nverse of M on module m. Gven the characterstcs of the resdue number system, t s used n computatonal applcatons such as dgtal sgnal processng system, dgtal flters, codng, encrypton systems, dgtal communcatons, ad hoc networks, nformaton storage and retreval, and error detecton and correcton. Moreover, snce the computatons are done separately on remanders n ths system, f an error occurs on one of the remanders, others are mmune to ts mpact. 3. Prevous Works Encrypton may be performed n ether a dgtal or analog way. In analog encrypton, whch s also called speech scramblng, the operatons are done on the speech samples. In analog scramblng, there s no need for a modem or speech compresson to transmt. The qualty of retreved speech does not depend on ts language. Usng an approprate nterface, these scramblng methods can be easly connected to the avalable analog channels such as telephone, satellte, and moble communcaton lnks. The dgtal encrypton dgtalzes the nput speech sgnal frst. Then the dgtalzed sgnal s compressed n order to generate a bt sequence wth an approprate bt rate. Usng modem, ths bt sequence s encrypted and transmtted to the channel. Analog scramblng s dvded nto several classes: - Tme scramblng - Frequency scramblng - Scramblng wth pseudo-nose sequences - Scramblng wth maxmal-length sequences - Scramblng wth gold sequences - Scramblng wth pseudo-gold sequences - Scramblng wth Barker sequences - Scramblng wth pseudo-barker sequences - Scramblng wth Kasam sequences There are also 7 dfferent styles defned for the cryptography of audo sgnals. 1- There s no need for cryptography. 2- The qualty of speech s not hgh whle the requred securty level s so low. 3- The requred securty s low whle power consumpton and tme delay are very low. (5) 69

4 Audo Sgnal Encrypton Based on F. Ghanbar Adv, M. Mehrna 4- The requred securty s hgher than Case 3 whle more power and tme are consumed. 5- The requred securty s average, and the consumed tme and power are hgh. 6- The securty s more than Case The securty and tme delay are hgher. 8- The sender emphaszes on the hgh securty of ts audo streamng wthout consderng other factors (power consumpton and tme delay). Two nstances of audo encrypton algorthms based on the abovementoned mechansms are explaned n what follows. In [1], a four-level method was presented for audo sgnal encrypton. In ths method, the output of each level s used as the nput of the next. In algorthm [1], changng the formaton of bts at the frst level, usng a random generator at the second level, usng t agan at the thrd level, and, fnally, usng the ascendng formaton of the ampltude feld at the fourth level result n the generaton of an encrypted sgnal lke a contnuous beep. authors n [3], propose a smple and effectve detecton algorthm whch detects the tme-frequency (TF) ponts occuped by only a sngle source for each source. The detecton algorthm dentfes the sngle source ponts by comparng the normalzed real and magnary parts of the TF coeffcent vectors of the mxed sgnals, whch s smpler than prevously reported algorthms. Then we propose a modfed smlarty-based robust clusterng method (MSCM) to estmate the number of sources and the mxng matrx usng these detected sngle source ponts. Expermental results show the effcency of the proposed algorthm, especally n the cases where the number of sources s unknown. In [2], the Independent Component Analyss (ICA) of the audo sgnal was used to propose a method for encrypton. In ths method, the audo sgnal s dvded nto several parts. The sgnal dvson process s n a way that each part has an equal number of samples that wll be ndependent from each other so that the successful use of ICA would be guaranteed. In the next step, the correlaton matrx s generated, and then each part s encrypted through the process of non-correlaton, named whtenng n ths paper. The whtenng process uses the Prncple Component Analyss (PCA) of the dmensonalty reducton algorthm. the authors n [11], present an RNS algorthm resolvng the Closest Vector Problem (CVP). Ths algorthm s partcularly effcent for a certan class of lattce bass. It provdes a full RNS Baba round-off procedure wthout any costly converson nto alternatve postonal number system such as Mxed Radx System (MRS). An optmzed Cox-Rower archtecture adapted to the proposed algorthm s also presented. The man modfcatons resde n the Rower unt whose feature s to use only one multpler. Ths allows freeng two out of three multplers from the Rower unt by reusng the same one wth an overhead of 3 more cycles per nner reducton. An analyss of feasblty of mplementaton wthn FPGA s also gven. The authors n [12] demonstrate the effcency of approach usng 32 chosen egenvalues n the key generaton algorthm. The egenvalues are derved from a reference mage. Throughout the processes on the mage data, we use modular arthmetc to ensure that computatons wth the resultng RNS become very effcent. Moreover, the approach consders mage n a dvded matrx doman and fnally combnes all ndependent cryptographc operatons as encrypton s a one-to-one 70

5 Journal of Advances n Computer Research (Vol. 7, No. 3, August 2016) mappng. Ths deals wth the possblty of havng any pxel value ll-stored or wrongly receved at the recever end, wthout affectng the decrypton process. However, the fnal recovered mage wll dffer by a neglgble amount. the authors n [13], present a speech encrypton algorthm, whch can penetrate compresson encoder. The algorthm scrambles the speech sgnal n frequency doman based on FFT transformaton doman n the sender, and t decrypts and reconstructs the sgnal n the recevng end. The encrypted speech sgnal stll has the characterstcs of speech, the resdual ntellgblty of the speech s low enough and the speech bandwdth does not be wdened. Scramble matrx can meet the needs of speech transmsson securty and acheve one key for one secret communcaton flexbly. End-to-end communcaton can avod the common eavesdroppng and theft, and has a relatvely broad prospects for development. In [14], a robust Audo steganography technque s proposed by randomzng and dynamcally changng the embeddng sequence. Advance Encrypton standards s used for provdng addtonal securty and robustness to the algorthm and tested for the 30 speech fles. The addton of cryptography n steganography ncreases the robustness and ntroduces a hgher level of securty snce the key s requred to decrypt the secret message. To evaluate the qualty of the stego fles SNR and Correlaton coeffcents are calculated and an expermental test s also performed over 10 lsteners to dentfy the change n the orgnal audo and cover audo. the authors n [15], presents an analyss of the tradeoff between securty level and compresson rato n real-tme voce communcaton. It s hypotheszed that the combnaton of varable btrate compresson and same length encrypton wll nduce vulnerablty to traffc analyss. The varaton of packet szes can leak nformaton about the conversaton startng wth language dentfcaton, dentfyng certan phrases, and reconstructng phonemes. The proposed soluton to ths problem s to rely on constant btrate compresson or to pad the sent frames to a multple of 16, 32, or 64 bytes. In [16], a symmetrc key s developed whch conssts of reshufflng and secret arrangement of secret sgnal data bts n cover sgnal data bts. In ths paper the authors have performed the encrypton process on secret speech sgnal data bts-level to acheve greater strength of encrypton whch s hdden nsde the cover mage. The encrypton algorthm appled wth embeddng method s the robust secure method for data hdng. 4. The Proposed Algorthm Ths part presents the audo sgnal encrypton based on the permutaton of the resdue number system as the proposed algorthm. Ths algorthm can be executed on both stereo and mono sgnals for encrypton. Three dfferent encrypton keys are defned n the current approach. The frst encrypton ncludes the values of modular components; the second encrypton s the formaton order of modules; and the thrd formaton key s the permutaton pattern. The relatons of permutaton pattern are multples of the number of modules. It s obvous that the more the number of modules are, the more the permutaton relatons become; therefore, the coeffcent of sgnal securty soars. However, f the number of modules and the permutaton relatons of the sgnal ncrease, the overhead resultng from ther applcaton to the sgnal becomes heaver; thus, the output sgnal volume ncreases. In the proposed algorthm, the permutaton relatons scramble the elements composng sgnal. They are scrambled n an organzed way due to the predefned relatons. Havng the encrypton keys, the encrypted sgnal can be decrypted. 71

6 Audo Sgnal Encrypton Based on F. Ghanbar Adv, M. Mehrna A set of modules lke {2 n -1, 2 n, 2 n +1} was used n the current approach. Gven the fact that there are 3 members n ths set, the permutaton relatons wll have 9 rules. They are closely assocated wth the number of members n the set of modules. These relatons can be the number of modular sets by the power of 2 so that the sgnal encrypton process could be based on them. The relatons pertanng to a modular set lke {2 n -1, 2 n, 2 n +1} are demonstrated n the followng table. Table 1: Permutaton Relatons of the Proposed Algorthm Output nput Y[n] Y[n+1] Y[n+2] Y[n+3] Y[n+4] Y[n+5] Y[n+6] Y[n+7] Y[n+8] The defnton of the permutaton relatons should also have specal relatonshps so that the encrypton process would be done free of errors. These relatonshps are as follows: 1- The number of relatons should be the number of modules by the power of The remander of each element of the nput sgnal on all the modules should exst n permutaton relatons. In Table 1, the values of x[n] refer to the nput sgnal samples, and the values of Y[n] represent the output sgnal samples resultng from applyng the permutaton relatons and the resdue number system. The relatons are appled n a way that the frst sample and the last three samples were not changed, and the relatons were appled to the rest of the samples. That the frst sample and the last three samples were not changed resulted n the correct executon of relaton. The encrypted sgnal s defned accordng to [ [ ] [ ] [ ] [ ] [ ] [ EncryptedSgnal = x 1 Y 1 Y n x end 3 x end 2 x end 1] ] (6) Gven the regulated scramblng of audo sgnal samples, sgnal decrypton based on the permutaton relatons, shown n Table 1, and the modular set wll be a quck, effcent process. An nstance of sgnal form change based on the proposed encrypton sgnal can be seen n Fgures (1) and (2). 72

7 Journal of Advances n Computer Research (Vol. 7, No. 3, August 2016) Fgure 1. The Man Sgnal (not Encrypted Sgnal) Fgure 2. The Encrypted Sgnal: Ths Sgnal s Encrypted by Algorthm and Convert to Slent Sgnal wth same frequency Accordng to Fgures (1) and (2), there s no sgn of the man sgnal samples n the encrypted sgnal whch s lke a sgnal wth a constant frequency. Snce dfferent encrypton parameters are used n the algorthm, t can adapt to every condton related to the transfer medum. Increasng or decreasng the number of modules and changng the number of permutaton relatons or the type of relatons, t can also ncrease the securty coeffcent or decrease the overhead resultng from the encrypton process. However, t s necessary to establsh a balance between the number of modules and permutaton relatons and the type of relatons n order to propose an optmal algorthm. The decrypton of audo sgnals s another problem of audo sgnal encrypton algorthms. Such an algorthm s consdered effcent when the decrypted sgnal has the same qualty as the man sgnal, or the qualty s close to the man one. The qualty of decrypted sgnal s very mportant n the proposed algorthm; therefore, efforts were made to decrypt the sgnal wth the best qualty. Consderng the fact that the resdue number system was used to decrypt the audo sgnal, t s necessary that the remanng value of modules be changed to the ntal values after permutaton through the Chnese Remander Theorem. The sgnal decrypton process has two general steps: - Fndng the multplcatve nverson for the module used n the encrypton algorthm based on equ. 3, equ. 4 and equ. 5 - Usng Relaton equ. 3 and the permutaton relatons defned n Table 1 to decrypt the encrypted sgnal 73

8 Audo Sgnal Encrypton Based on F. Ghanbar Adv, M. Mehrna 5. Performance Evaluaton There are no absolute measures to evaluate nose, and all noses are measured n a relatve way. The sgnal-to-nose rato (SNR) s used to measure the sgnal nose. The values of SNR that are smaller than 12 ndcate that the sgnal has much nose; however, the values above 30 mean that the sgnal has very lttle nose. SNR = 10log 2 ( n) N = 10 2 $ s s( n ) n( n) Matlab was used to smulate the sgnal encrypton and decrypton algorthm. The pseudo-code pertanng to the encrypton algorthm can be seen n Fgure 3: [Y,Fs]= [Read Audo Sgnal] Y=Y(:,1)+Y(:,2); Y=Y'; Resultn=1; for n=2:numel(y)-3 result(resultn)=mod(y(n+1),5) + 5; result(resultn+1)=mod(y(n-1),3) + 3; result(resultn+2)=mod(y(n),4) + 4; result(resultn+3)=mod(y(n+1),3) + 3; result(resultn+4)=mod(y(n-1),5) + 5; result(resultn+5)=mod(y(n),3) + 3; result(resultn+6)=mod(y(n-1),4) + 4; result(resultn+7)=mod(y(n+1),4) + 4; result(resultn+8)=mod(y(n),5) + 5; Resultn = Resultn + (3^2); n=n+3; end result = [Y(1) result Y(end-3) Y(end-2) Y(end-1)]; Fgure 3: Algorthm Source Code n Matlab In Table 2, SNR was measured for 7 dfferent audo sgnals that were converted nto an encrypted sgnal through the encrypton algorthm. Accordng to ths table, the values of SNR are very low, a fact that ndcates the hgh power of the proposed encrypton algorthm. Ths table can also lead to the nference that the proposed algorthm can deal wth every number of samples correctly and encrypts the sgnal at the hghest level of securty. (7) Dfferent Sgnals Sgnal 1 Sgnal 2 Sgnal 3 Sgnal 4 Sgnal 5 Sgnal 6 Sgnal 7 Table 2: SNR after Encryptng Audo Sgnals The Number of Samples SNR e e e e e e-08 74

9 Journal of Advances n Computer Research (Vol. 7, No. 3, August 2016) Concluson In the current approach, an algorthm based on permutaton relatons and the resdue number system was proposed for audo sgnal encrypton. The results ndcated that the proposed algorthm had a hgh level of securty and audo qualty n decrypton. Usng the resdue number system, a three-member modular set, and 9 permutaton relatons n ths algorthm, the ntal sgnal was encrypted. Therefore, the cryptanalyss was dffcult, and the securty of audo sgnal ncreased. For decrypton, t was necessary to take the permutaton relatons nto account frst n order to reconstruct the sgnal. Based on the Chnese Remander Theorem, the values were then converted nto the ntal samples of sgnal. Therefore, a good qualty was presented after decryptng the encrypted audo sgnal. References [1] Harjnder Kaur, A four level speech sgnal encrypton YCSC, vol3, pp [2] Sttar B. Sadkhan, Ndaa A. Abbas, 2014, A proposed voce encrypton System Base on off-lne ca Algorthm, Journal Babylon unversty/pure and Appled Scences/No (7) Vol (22) [3] Tanbo Dong, Yngke Le & Jnhshu Yang, 2012, An Algorthm for Underdetermned Mxng Extmaton, Elsever, Neurocomputng(pp-1-9) [4] Mosa, 2009, Random encrypton of speech sgnal, Computer Engneerng & Systems. ICCES Internatonal Conference [5] Mosa, 2009, Chaostc encrypton of speech sgnals n transform domans, Computer Engneerng & Systems, ICCES Internatonal Conference [6] Anwar, S.; Alam, S.B.; Rahman, K.M.S, 2010, Informaton Theory and Informaton Securty (ICITIS), IEEE Internatonal Conference on P [7] Basher, E.B.M., 2013, Speech scramblng based on chaotc maps and one-tme pad, Computng, Electrcal and Electroncs Engneerng (ICCEEE), Internatonal Conference on Pp [8] Patl, S.B., 2015, A robust encrypton method for speech data hdng n dgtal mages for optmzed securty, Pervasve Computng (ICPC), Internatonal Conference P.1-5 [9] Kohata, M, 2014, Secure Speech Encrypton System Usng Segments for Speech Synthess, 2014, Intellgent Informaton Hdng and Multmeda Sgnal Processng (IIH-MSP), Tenth Internatonal Conference, P [10] Radha, 2011, Comparatve analyss of compresson technques for Taml speech datasets, Recent Trends n Informaton Technology (ICRTIT), Internatonal Conference on P [11] J. C. Bajard, 2015, RNS Arthmetc Approach n Lattce-Based Cryptography: Acceleratng the "Roundng-off" Core Procedure, Computer Arthmetc (ARITH) IEEE 22nd [12] G. K. Armah, 2015, Applcaton of resdue number system (RNS) to mage processng usng orthogonal transformaton, 2015, Communcaton Software and Networks (ICCSN), IEEE Internatonal Conference [13] Yaoyao Chen, 2015, End-to-end speech encrypton algorthm based on speech scramblng n frequency doman, Thrd Internatonal Conference on Cyberspace Technology on Pp. 1 5 [14] A. Kanhe, 2015, Robust Audo steganography based on Advanced Encrypton standards n temporal doman, 2015, Advances n Computng, Communcatons and Informatcs (ICACCI), Internatonal Conference on P.p

10 Audo Sgnal Encrypton Based on F. Ghanbar Adv, M. Mehrna [15] Atte, 2015, Analyss of the tradeoff between compresson rato and securty level n real-tme voce communcaton, Appled Research n Computer Scence and Engneerng (ICAR), 2015 Internatonal Conference on, Pp. 1-6 [16] S. A. Kulkarn, 2015, A robust encrypton method for speech data hdng n dgtal mages for optmzed securty, Pervasve Computng (ICPC), 2015 Internatonal Conference on Pp

Audio Signal Encryption Based on Permutation Relations and Residue Number System

Audio Signal Encryption Based on Permutation Relations and Residue Number System Quarterly ISSN: 2008-6148 Sari Branch, Islamic Azad University, Sari, I.R.Iran (Vol. x, No. x, MonthYear), Pages: xx-xx www.jacr.iausari.ac.ir Audio Signal Encryption Based on Permutation Relations and

More information

Chaotic Filter Bank for Computer Cryptography

Chaotic Filter Bank for Computer Cryptography Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College

More information

Secure Transmission of Sensitive data using multiple channels

Secure Transmission of Sensitive data using multiple channels Secure Transmsson of Senstve data usng multple channels Ahmed A. Belal, Ph.D. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. aabelal@hotmal.com

More information

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

Calculation of the received voltage due to the radiation from multiple co-frequency sources

Calculation of the received voltage due to the radiation from multiple co-frequency sources Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons

More information

High Speed, Low Power And Area Efficient Carry-Select Adder

High Speed, Low Power And Area Efficient Carry-Select Adder Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs

More information

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht 68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly

More information

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b 2nd Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 207) Research of Dspatchng Method n Elevator Group Control System Based on Fuzzy Neural Network Yufeng

More information

A study of turbo codes for multilevel modulations in Gaussian and mobile channels

A study of turbo codes for multilevel modulations in Gaussian and mobile channels A study of turbo codes for multlevel modulatons n Gaussan and moble channels Lamne Sylla and Paul Forter (sylla, forter)@gel.ulaval.ca Department of Electrcal and Computer Engneerng Laval Unversty, Ste-Foy,

More information

Digital Transmission

Digital Transmission Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal

More information

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985 NATONAL RADO ASTRONOMY OBSERVATORY Green Bank, West Vrgna SPECTRAL PROCESSOR MEMO NO. 25 MEMORANDUM February 13, 1985 To: Spectral Processor Group From: R. Fsher Subj: Some Experments wth an nteger FFT

More information

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com

More information

Fast Code Detection Using High Speed Time Delay Neural Networks

Fast Code Detection Using High Speed Time Delay Neural Networks Fast Code Detecton Usng Hgh Speed Tme Delay Neural Networks Hazem M. El-Bakry 1 and Nkos Mastoraks 1 Faculty of Computer Scence & Informaton Systems, Mansoura Unversty, Egypt helbakry0@yahoo.com Department

More information

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol., No., November 23, 3-9 Rejecton of PSK Interference n DS-SS/PSK System Usng Adaptve Transversal Flter wth Condtonal Response Recalculaton Zorca Nkolć, Bojan

More information

Chinese Remainder. Discrete Mathematics Andrei Bulatov

Chinese Remainder. Discrete Mathematics Andrei Bulatov Chnese Remander Introducton Theorem Dscrete Mathematcs Andre Bulatov Dscrete Mathematcs Chnese Remander Theorem 34-2 Prevous Lecture Resdues and arthmetc operatons Caesar cpher Pseudorandom generators

More information

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding Sde-Match Vector Quantzers Usng Neural Network Based Varance Predctor for Image Codng Shuangteng Zhang Department of Computer Scence Eastern Kentucky Unversty Rchmond, KY 40475, U.S.A. shuangteng.zhang@eku.edu

More information

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System Int. J. Communcatons, Network and System Scences, 10, 3, 1-5 do:10.36/jcns.10.358 Publshed Onlne May 10 (http://www.scrp.org/journal/jcns/) The Performance Improvement of BASK System for Gga-Bt MODEM Usng

More information

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,

More information

A Current Differential Line Protection Using a Synchronous Reference Frame Approach

A Current Differential Line Protection Using a Synchronous Reference Frame Approach A Current Dfferental Lne rotecton Usng a Synchronous Reference Frame Approach L. Sousa Martns *, Carlos Fortunato *, and V.Fernão res * * Escola Sup. Tecnologa Setúbal / Inst. oltécnco Setúbal, Setúbal,

More information

Graph Method for Solving Switched Capacitors Circuits

Graph Method for Solving Switched Capacitors Circuits Recent Advances n rcuts, ystems, gnal and Telecommuncatons Graph Method for olvng wtched apactors rcuts BHUMIL BRTNÍ Department of lectroncs and Informatcs ollege of Polytechncs Jhlava Tolstého 6, 586

More information

Passive Filters. References: Barbow (pp ), Hayes & Horowitz (pp 32-60), Rizzoni (Chap. 6)

Passive Filters. References: Barbow (pp ), Hayes & Horowitz (pp 32-60), Rizzoni (Chap. 6) Passve Flters eferences: Barbow (pp 6575), Hayes & Horowtz (pp 360), zzon (Chap. 6) Frequencyselectve or flter crcuts pass to the output only those nput sgnals that are n a desred range of frequences (called

More information

Learning Ensembles of Convolutional Neural Networks

Learning Ensembles of Convolutional Neural Networks Learnng Ensembles of Convolutonal Neural Networks Lran Chen The Unversty of Chcago Faculty Mentor: Greg Shakhnarovch Toyota Technologcal Insttute at Chcago 1 Introducton Convolutonal Neural Networks (CNN)

More information

A High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode

A High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode A Hgh-Senstvty Oversamplng Dgtal Sgnal Detecton Technque for CMOS Image Sensors Usng Non-destructve Intermedate Hgh-Speed Readout Mode Shoj Kawahto*, Nobuhro Kawa** and Yoshak Tadokoro** *Research Insttute

More information

ANNUAL OF NAVIGATION 11/2006

ANNUAL OF NAVIGATION 11/2006 ANNUAL OF NAVIGATION 11/2006 TOMASZ PRACZYK Naval Unversty of Gdyna A FEEDFORWARD LINEAR NEURAL NETWORK WITH HEBBA SELFORGANIZATION IN RADAR IMAGE COMPRESSION ABSTRACT The artcle presents the applcaton

More information

Double-lock for image encryption with virtual optical wavelength

Double-lock for image encryption with virtual optical wavelength Double-lock for mage encrypton wth vrtual optcal wavelength Xang Peng Natonal Laboratory of Precson Measurement Technology and Instrumentaton, Tanjn Unversty, 30007 Tanjn, Chna Lngfeng Yu, and Llong Ca

More information

High Speed ADC Sampling Transients

High Speed ADC Sampling Transients Hgh Speed ADC Samplng Transents Doug Stuetzle Hgh speed analog to dgtal converters (ADCs) are, at the analog sgnal nterface, track and hold devces. As such, they nclude samplng capactors and samplng swtches.

More information

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,

More information

Evaluate the Effective of Annular Aperture on the OTF for Fractal Optical Modulator

Evaluate the Effective of Annular Aperture on the OTF for Fractal Optical Modulator Global Advanced Research Journal of Management and Busness Studes (ISSN: 2315-5086) Vol. 4(3) pp. 082-086, March, 2015 Avalable onlne http://garj.org/garjmbs/ndex.htm Copyrght 2015 Global Advanced Research

More information

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme Proceedngs of the World Congress on Engneerng 2011 Vol II, July 6-8, 2011, London, U.K. Inverse Halftonng Method Usng Pattern Substtuton Based Data Hdng Scheme Me-Y Wu, Ja-Hong Lee and Hong-Je Wu Abstract

More information

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of

More information

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University Dynamc Optmzaton Assgnment 1 Sasanka Nagavall snagaval@andrew.cmu.edu 16-745 January 29, 213 Robotcs Insttute Carnege Mellon Unversty Table of Contents 1. Problem and Approach... 1 2. Optmzaton wthout

More information

antenna antenna (4.139)

antenna antenna (4.139) .6.6 The Lmts of Usable Input Levels for LNAs The sgnal voltage level delvered to the nput of an LNA from the antenna may vary n a very wde nterval, from very weak sgnals comparable to the nose level,

More information

Review: Our Approach 2. CSC310 Information Theory

Review: Our Approach 2. CSC310 Information Theory CSC30 Informaton Theory Sam Rowes Lecture 3: Provng the Kraft-McMllan Inequaltes September 8, 6 Revew: Our Approach The study of both compresson and transmsson requres that we abstract data and messages

More information

MULTICORE IMPLEMENTATION OF THE AES ALGORITHM IN THE MEASUREMENT SYSTEM

MULTICORE IMPLEMENTATION OF THE AES ALGORITHM IN THE MEASUREMENT SYSTEM XIX IMEKO World Congress Fundamental and Appled Metrology September 6 11, 2009, Lsbon, Portugal MULTICORE IMPLEMENTATION OF THE AES ALGORITHM IN THE MEASUREMENT SYSTEM Potr Blsk 1,2, Wesław Wneck 2 1 Warsaw

More information

Time-frequency Analysis Based State Diagnosis of Transformers Windings under the Short-Circuit Shock

Time-frequency Analysis Based State Diagnosis of Transformers Windings under the Short-Circuit Shock Tme-frequency Analyss Based State Dagnoss of Transformers Wndngs under the Short-Crcut Shock YUYING SHAO, ZHUSHI RAO School of Mechancal Engneerng ZHIJIAN JIN Hgh Voltage Lab Shangha Jao Tong Unversty

More information

Adaptive Modulation for Multiple Antenna Channels

Adaptive Modulation for Multiple Antenna Channels Adaptve Modulaton for Multple Antenna Channels June Chul Roh and Bhaskar D. Rao Department of Electrcal and Computer Engneerng Unversty of Calforna, San Dego La Jolla, CA 993-7 E-mal: jroh@ece.ucsd.edu,

More information

Steganography in JPEG2000 Compressed Images

Steganography in JPEG2000 Compressed Images 824 IEEE Transactons on Consumer Electroncs, Vol. 49, No. 4, NOVEMBER 2003 Steganography n JPEG2000 Compressed Images Po-Chy Su and C.-C. Jay Kuo, Fellow, IEEE Abstract Informaton hdng n JPEG2000 compressed

More information

A Novel and Secure technique for image. Steganography using DWT

A Novel and Secure technique for image. Steganography using DWT Internatonal Journal of Computer Technology and Electroncs Engneerng (IJCTEE) Volume 3 Issue 5 October 2013 A Novel and Secure technque for mage Abstract: Steganography s the art and scence of hdng nformaton

More information

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES IEE Electroncs Letters, vol 34, no 17, August 1998, pp. 1622-1624. ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES A. Chatzgeorgou, S. Nkolads 1 and I. Tsoukalas Computer Scence Department, 1 Department

More information

Low Switching Frequency Active Harmonic Elimination in Multilevel Converters with Unequal DC Voltages

Low Switching Frequency Active Harmonic Elimination in Multilevel Converters with Unequal DC Voltages Low Swtchng Frequency Actve Harmonc Elmnaton n Multlevel Converters wth Unequal DC Voltages Zhong Du,, Leon M. Tolbert, John N. Chasson, Hu L The Unversty of Tennessee Electrcal and Computer Engneerng

More information

A Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web

A Digital Content Distribution Using a Group-Key and Multi-layered Structure Based on Web A Dgtal Content Dstrbuton Usng a Group-Key and Mult-layered Structure Based on Web Yun-J Na and Il Seo Ko 2 Department of Internet Software, Honam Unversty 59-, Seobong-Dong, Gwangsan-Gu, Gwangju 506-74,

More information

Control Chart. Control Chart - history. Process in control. Developed in 1920 s. By Dr. Walter A. Shewhart

Control Chart. Control Chart - history. Process in control. Developed in 1920 s. By Dr. Walter A. Shewhart Control Chart - hstory Control Chart Developed n 920 s By Dr. Walter A. Shewhart 2 Process n control A phenomenon s sad to be controlled when, through the use of past experence, we can predct, at least

More information

Error Probability of RS Code Over Wireless Channel

Error Probability of RS Code Over Wireless Channel Internatonal Journal of Electroncs Engneerng, 3 (), 11, pp. 99 33 Serals Publcatons, ISS : 973-7383 Error Probablty of RS Code Over Wreless Channel Mohammad Aftab Alam Khan 1 & Mehwash Farooq 1 1 Department

More information

Delay Constrained Fuzzy Rate Control for Video Streaming over DVB-H

Delay Constrained Fuzzy Rate Control for Video Streaming over DVB-H Delay Constraned Fuzzy Rate Control for Vdeo Streamng over DVB-H Mehd Rezae, Moncef Gabbouj, 3 med Bouazz,, Tampere Unversty of Technology, 3 Noka Research Center, Tampere, Fnland mehd.rezae@tut.f, moncef.gabbouj@tut.f,

More information

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957

More information

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation 1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected

More information

Multiple Error Correction Using Reduced Precision Redundancy Technique

Multiple Error Correction Using Reduced Precision Redundancy Technique Multple Error Correcton Usng Reduced Precson Redundancy Technque Chthra V 1, Nthka Bhas 2, Janeera D A 3 1,2,3 ECE Department, Dhanalakshm Srnvasan College of Engneerng,Combatore, Tamlnadu, Inda Abstract

More information

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network Avalable onlne at www.scencedrect.com Proceda Engneerng 5 (2 44 445 A Prelmnary Study on Targets Assocaton Algorthm of Radar and AIS Usng BP Neural Networ Hu Xaoru a, Ln Changchuan a a Navgaton Insttute

More information

A Fuzzy-based Routing Strategy for Multihop Cognitive Radio Networks

A Fuzzy-based Routing Strategy for Multihop Cognitive Radio Networks 74 Internatonal Journal of Communcaton Networks and Informaton Securty (IJCNIS) Vol. 3, No., Aprl 0 A Fuzzy-based Routng Strategy for Multhop Cogntve Rado Networks Al El Masr, Naceur Malouch and Hcham

More information

A High-Speed Multiplication Algorithm Using Modified Partial Product Reduction Tree

A High-Speed Multiplication Algorithm Using Modified Partial Product Reduction Tree World Academy of Scence, Engneerng and Technology Internatonal Journal of Electrcal and Computer Engneerng Vol:4, No:, 200 A Hgh-Speed Multplcaton Algorthm Usng Modfed Partal Product educton Tree P Asadee

More information

International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January SYSTEL, SUPCOM, Tunisia.

International Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January SYSTEL, SUPCOM, Tunisia. Internatonal Journal of Network Securty & Its Applcaton (IJNSA), Vol.2, No., January 2 WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES Omessaad Hamd, Manel abdelhed 2, Ammar Bouallegue 2,

More information

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS INTRODUCTION Because dgtal sgnal rates n computng systems are ncreasng at an astonshng rate, sgnal ntegrty ssues have become far more mportant to

More information

Figure.1. Basic model of an impedance source converter JCHPS Special Issue 12: August Page 13

Figure.1. Basic model of an impedance source converter JCHPS Special Issue 12: August Page 13 A Hgh Gan DC - DC Converter wth Soft Swtchng and Power actor Correcton for Renewable Energy Applcaton T. Selvakumaran* and. Svachdambaranathan Department of EEE, Sathyabama Unversty, Chenna, Inda. *Correspondng

More information

An Efficient Method for PAPR Reduction of OFDM Signal with Low Complexity

An Efficient Method for PAPR Reduction of OFDM Signal with Low Complexity An Effcent Method for PAPR Reducton of OFDM Sgnal wth Low Complety Mahesh Ingle M.E. EXTC MGMCET,Kamothe Nav Mumba-41009 Sachn Nkalje M.E. EXTC MGMCET Kamothe Nav Mumba-41009 Savta Bhosale H.o.D.(EXTC)

More information

Shunt Active Filters (SAF)

Shunt Active Filters (SAF) EN-TH05-/004 Martt Tuomanen (9) Shunt Actve Flters (SAF) Operaton prncple of a Shunt Actve Flter. Non-lnear loads lke Varable Speed Drves, Unnterrupted Power Supples and all knd of rectfers draw a non-snusodal

More information

California, 4 University of California, Berkeley

California, 4 University of California, Berkeley Dversty Processng WCDMA Cell earcher Implementaton Ahmed M. Eltawl, Eugene Grayver 2, Alreza Targhat, Jean Francos Frgon, Kambz hoarnejad, Hanl Zou 3 and Danjela Cabrc 4 Unversty of Calforna, Los Angeles,

More information

Low-Delay 16 kb/s Wideband Speech Coder with Fast Search Methods

Low-Delay 16 kb/s Wideband Speech Coder with Fast Search Methods Low-Delay 16 b/s Wdeband Speech Coder wth Fast Search Methods M. HALIMI M. BENGHERABI A. KADDAI Speech Codng eam Centre de Développement des echnologes Avancées Haouch Oul BP. 17 Baba Hassen Algers ALGERIA

More information

An efficient cluster-based power saving scheme for wireless sensor networks

An efficient cluster-based power saving scheme for wireless sensor networks RESEARCH Open Access An effcent cluster-based power savng scheme for wreless sensor networks Jau-Yang Chang * and Pe-Hao Ju Abstract In ths artcle, effcent power savng scheme and correspondng algorthm

More information

Multicarrier Modulation

Multicarrier Modulation Multcarrer Modulaton Wha Sook Jeon Moble Computng & Communcatons Lab Contents Concept of multcarrer modulaton Data transmsson over multple carrers Multcarrer modulaton wth overlappng Chap. subchannels

More information

THE GENERATION OF 400 MW RF PULSES AT X-BAND USING RESONANT DELAY LINES *

THE GENERATION OF 400 MW RF PULSES AT X-BAND USING RESONANT DELAY LINES * SLAC PUB 874 3/1999 THE GENERATION OF 4 MW RF PULSES AT X-BAND USING RESONANT DELAY LINES * Sam G. Tantaw, Arnold E. Vleks, and Rod J. Loewen Stanford Lnear Accelerator Center, Stanford Unversty P.O. Box

More information

Accelerated Modular Multiplication Algorithm of Large Word Length Numbers with a Fixed Module

Accelerated Modular Multiplication Algorithm of Large Word Length Numbers with a Fixed Module Accelerated Modular Multplcaton Algorthm of Large Word Length Numbers wth a Fxed Module Nkolaos Bards 1, Athanasos Drgas 1, Alexander Markovskyy, and John Vrettaros 1 1 Natonal Centre for Scentfc Research

More information

SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS

SECURE COMMUNICATION BY USING MULTIPLE KEYS HAVING VARIABLE LENGTH IN A REAL TIME ENVIRONMENT FOR MULTIPLE STATIONS Journal of Engneerng Scence and echnology Vol. 7, No. 4 ( 55-56 School of Engneerng, aylor s Unversty SECURE COMMUNICAION BY USING MULIPLE KEYS HAVING VARIABLE LENGH IN A REAL IME ENVIRONMEN FOR MULIPLE

More information

A Novel GNSS Weak Signal Acquisition Using Wavelet Denoising Method

A Novel GNSS Weak Signal Acquisition Using Wavelet Denoising Method A Novel GNSS Weak Sgnal Acquston Usng Wavelet Denosng Method Jn Tan, Lu Yang, BeHang Unversty, P.R.Chna BIOGRAPHY Jn Tan s a post-doctor n School of Electronc and Informaton Engneerng, BeHang Unversty,

More information

Spread Spectrum based M-ary Modulated Robust Image Watermarking

Spread Spectrum based M-ary Modulated Robust Image Watermarking 54 IJCSS Internatonal Journal of Computer Scence and etwor Securty, VOL.7 o., October 27 Spread Spectrum based M-ary Modulated Robust Image atermarng T. S. Das, V. H. Manar 2 and S. K. Sarar 3, Dept. of

More information

The Application of Interpolation Algorithms in OFDM Channel Estimation

The Application of Interpolation Algorithms in OFDM Channel Estimation The Applcaton of Interpolaton Algorthms n OFDM Estmaton Xjun ZHANG 1,, Zhantng YUAN 1, 1 School of Electrcal and Informaton Engneerng, Lanzhou Unversty of Technology, Lanzhou, Gansu 730050, Chna School

More information

On the Feasibility of Receive Collaboration in Wireless Sensor Networks

On the Feasibility of Receive Collaboration in Wireless Sensor Networks On the Feasblty of Receve Collaboraton n Wreless Sensor Networs B. Bantaleb, S. Sgg and M. Begl Computer Scence Department Insttute of Operatng System and Computer Networs (IBR) Braunschweg, Germany {behnam,

More information

RESOURCE CONTROL FOR HYBRID CODE AND TIME DIVISION SCHEDULING

RESOURCE CONTROL FOR HYBRID CODE AND TIME DIVISION SCHEDULING RESOURCE CONTROL FOR HYBRID CODE AND TIME DIVISION SCHEDULING Vaslos A. Srs Insttute of Computer Scence (ICS), FORTH and Department of Computer Scence, Unversty of Crete P.O. Box 385, GR 7 Heraklon, Crete,

More information

Ensemble Evolution of Checkers Players with Knowledge of Opening, Middle and Endgame

Ensemble Evolution of Checkers Players with Knowledge of Opening, Middle and Endgame Ensemble Evoluton of Checkers Players wth Knowledge of Openng, Mddle and Endgame Kyung-Joong Km and Sung-Bae Cho Department of Computer Scence, Yonse Unversty 134 Shnchon-dong, Sudaemoon-ku, Seoul 120-749

More information

FFT Spectrum Analyzer

FFT Spectrum Analyzer THE ANNUAL SYMPOSIUM OF THE INSTITUTE OF SOLID MECHANICS SISOM 22 BUCHAREST May 16-17 ----------------------------------------------------------------------------------------------------------------------------------------

More information

DESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER

DESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER DESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER Ha-Nam Nguyen, Danel Menard, and Olver Senteys IRISA/INRIA, Unversty of Rennes, rue de Kerampont F-3 Lannon Emal: hanguyen@rsa.fr ABSTRACT To satsfy energy

More information

MODEL ORDER REDUCTION AND CONTROLLER DESIGN OF DISCRETE SYSTEM EMPLOYING REAL CODED GENETIC ALGORITHM J. S. Yadav, N. P. Patidar, J.

MODEL ORDER REDUCTION AND CONTROLLER DESIGN OF DISCRETE SYSTEM EMPLOYING REAL CODED GENETIC ALGORITHM J. S. Yadav, N. P. Patidar, J. ABSTRACT Research Artcle MODEL ORDER REDUCTION AND CONTROLLER DESIGN OF DISCRETE SYSTEM EMPLOYING REAL CODED GENETIC ALGORITHM J. S. Yadav, N. P. Patdar, J. Sngha Address for Correspondence Maulana Azad

More information

AN IMPROVED BIT LOADING TECHNIQUE FOR ENHANCED ENERGY EFFICIENCY IN NEXT GENERATION VOICE/VIDEO APPLICATIONS

AN IMPROVED BIT LOADING TECHNIQUE FOR ENHANCED ENERGY EFFICIENCY IN NEXT GENERATION VOICE/VIDEO APPLICATIONS Journal of Engneerng Scence and Technology Vol., o. 4 (6) 476-495 School of Engneerng, Taylor s Unversty A IMPROVED BIT LOADIG TECHIQUE FOR EHACED EERGY EFFICIECY I EXT GEERATIO VOICE/VIDEO APPLICATIOS

More information

Generalized Incomplete Trojan-Type Designs with Unequal Cell Sizes

Generalized Incomplete Trojan-Type Designs with Unequal Cell Sizes Internatonal Journal of Theoretcal & Appled Scences 6(1): 50-54(2014) ISSN No. (Prnt): 0975-1718 ISSN No. (Onlne): 2249-3247 Generalzed Incomplete Trojan-Type Desgns wth Unequal Cell Szes Cn Varghese,

More information

PERFORMANCE EVALUATION OF BOOTH AND WALLACE MULTIPLIER USING FIR FILTER. Chirala Engineering College, Chirala.

PERFORMANCE EVALUATION OF BOOTH AND WALLACE MULTIPLIER USING FIR FILTER. Chirala Engineering College, Chirala. PERFORMANCE EVALUATION OF BOOTH AND WALLACE MULTIPLIER USING FIR FILTER 1 H. RAGHUNATHA RAO, T. ASHOK KUMAR & 3 N.SURESH BABU 1,&3 Department of Electroncs and Communcaton Engneerng, Chrala Engneerng College,

More information

Radio Link Parameters Based QoE Measurement of Voice Service in GSM Network *

Radio Link Parameters Based QoE Measurement of Voice Service in GSM Network * Communcatons and etwork, 2013, 5, 448-454 http://dx.do.org/10.4236/cn.2013.53b2083 Publshed Onlne September 2013 (http://www.scrp.org/journal/cn) Rado Lnk Parameters Based QoE Measurement of Voce Servce

More information

Understanding the Spike Algorithm

Understanding the Spike Algorithm Understandng the Spke Algorthm Vctor Ejkhout and Robert van de Gejn May, ntroducton The parallel soluton of lnear systems has a long hstory, spannng both drect and teratve methods Whle drect methods exst

More information

New Wavelet Based Performance Analysis and Optimization of Scalable Joint Source/Channel Coder (SJSCC & SJSCCN) for Time-Varying Channels.

New Wavelet Based Performance Analysis and Optimization of Scalable Joint Source/Channel Coder (SJSCC & SJSCCN) for Time-Varying Channels. Internatonal Research Journal of Engneerng and Technology (IRJET) e-issn: 2395-0056 Volume: 02 Issue: 09 DEC-205 p-issn: 2395-0072 www.rjet.net New Wavelet Based Performance Analyss and Optmzaton of Scalable

More information

Application of Intelligent Voltage Control System to Korean Power Systems

Application of Intelligent Voltage Control System to Korean Power Systems Applcaton of Intellgent Voltage Control System to Korean Power Systems WonKun Yu a,1 and HeungJae Lee b, *,2 a Department of Power System, Seol Unversty, South Korea. b Department of Power System, Kwangwoon

More information

29. Network Functions for Circuits Containing Op Amps

29. Network Functions for Circuits Containing Op Amps 9. Network Functons for Crcuts Contanng Op Amps Introducton Each of the crcuts n ths problem set contans at least one op amp. Also each crcut s represented by a gven network functon. These problems can

More information

Optimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation

Optimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation T. Kerdchuen and W. Ongsakul / GMSARN Internatonal Journal (09) - Optmal Placement of and by Hybrd Genetc Algorthm and Smulated Annealng for Multarea Power System State Estmaton Thawatch Kerdchuen and

More information

Improved Error Detection in the JPEG2000 Codec

Improved Error Detection in the JPEG2000 Codec Improved Error Detecton n the JPEG2000 Codec Farzad Zargar, Member, IEEE, Al Sefdpour, M. Shahram Mon, Member, IEEE, and Mohammad Ghanbar, Fellow, IEEE Abstract the Segmentaton symbol s an error reslence

More information

Multipath Propagation. Outline. What is OFDM? (OFDM) for Broadband Communications and. Orthogonal Frequency Division Multiplexing

Multipath Propagation. Outline. What is OFDM? (OFDM) for Broadband Communications and. Orthogonal Frequency Division Multiplexing Orthogonal Dvson Multplexng (OFDM) for Broadband Communcatons and Dgtal Audo Broadcastng (DAB) Klaus Wtrsal wtrsal@nw.tugraz.at VL: Dgtale Audotechnk, 21. März, 2002 What s OFDM? Modulaton technque Requres

More information

NETWORK 2001 Transportation Planning Under Multiple Objectives

NETWORK 2001 Transportation Planning Under Multiple Objectives NETWORK 200 Transportaton Plannng Under Multple Objectves Woodam Chung Graduate Research Assstant, Department of Forest Engneerng, Oregon State Unversty, Corvalls, OR9733, Tel: (54) 737-4952, Fax: (54)

More information

Keywords LTE, Uplink, Power Control, Fractional Power Control.

Keywords LTE, Uplink, Power Control, Fractional Power Control. Volume 3, Issue 6, June 2013 ISSN: 2277 128X Internatonal Journal of Advanced Research n Computer Scence and Software Engneerng Research Paper Avalable onlne at: www.jarcsse.com Uplnk Power Control Schemes

More information

DESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER

DESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER 7th European Sgnal Processng Conference (EUSIPCO 9) Glasgow, Scotland, August -8, 9 DESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER Ha-Nam Nguyen, Danel Menard, and Olver Senteys IRISA/INRIA, Unversty of

More information

Performance Analysis of the Weighted Window CFAR Algorithms

Performance Analysis of the Weighted Window CFAR Algorithms Performance Analyss of the Weghted Wndow CFAR Algorthms eng Xangwe Guan Jan He You Department of Electronc Engneerng, Naval Aeronautcal Engneerng Academy, Er a road 88, Yanta Cty 6400, Shandong Provnce,

More information

Direct Sequence Spread Spectrum (DSSS)

Direct Sequence Spread Spectrum (DSSS) Drect Sequence Spread Spectrum (DSSS) DS-SS DS-SS uses sequences for spectrum spreadng and phase modulaton Modulaton s bnary SK (BSK) or quaternary SK (QSK) Message BSK - - - - QSK BSK Bt hase Dr. Cesar

More information

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems APSIPA ASC 2011 X an Throughput Maxmzaton by Adaptve Threshold Adjustment for AMC Systems We-Shun Lao and Hsuan-Jung Su Graduate Insttute of Communcaton Engneerng Department of Electrcal Engneerng Natonal

More information

A Robust Feature Extraction Algorithm for Audio Fingerprinting

A Robust Feature Extraction Algorithm for Audio Fingerprinting A Robust Feature Extracton Algorthm for Audo Fngerprntng Janpng Chen 1, Tejun Huang 2 1 Insttute of Computng Technology, Chnese Academy of Scences, Bejng 100190, Chna 2 Key Laboratory of Machne Percepton(Mnstry

More information

Hardware Design of Filter Bank-Based Narrowband/Wideband Interference Canceler for Overlaid TDMA/CDMA Systems

Hardware Design of Filter Bank-Based Narrowband/Wideband Interference Canceler for Overlaid TDMA/CDMA Systems Hardware Desgn of Flter anased arrowband/deband Interference Canceler for Overlad TDMA/CDMA Systems Toyoau Ktano Kaunor Hayash Htosh Masutan and Shnsue Hara Graduate School of Engneerng Osaa Unversty YamadaOa

More information

RC Filters TEP Related Topics Principle Equipment

RC Filters TEP Related Topics Principle Equipment RC Flters TEP Related Topcs Hgh-pass, low-pass, Wen-Robnson brdge, parallel-t flters, dfferentatng network, ntegratng network, step response, square wave, transfer functon. Prncple Resstor-Capactor (RC)

More information

[Type text] [Type text] [Type text] Wenjing Yuan Luxun Art Academy of Yan an University Xi an, , (CHINA)

[Type text] [Type text] [Type text] Wenjing Yuan Luxun Art Academy of Yan an University Xi an, , (CHINA) [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 19 BoTechnology 2014 An Indan Journal FULL PAPER BTAIJ, 10(19, 2014 [10873-10877] Computer smulaton analyss on pano tmbre ABSTRACT Wenjng

More information

Prevention of Sequential Message Loss in CAN Systems

Prevention of Sequential Message Loss in CAN Systems Preventon of Sequental Message Loss n CAN Systems Shengbng Jang Electrcal & Controls Integraton Lab GM R&D Center, MC: 480-106-390 30500 Mound Road, Warren, MI 48090 shengbng.jang@gm.com Ratnesh Kumar

More information

A Spreading Sequence Allocation Procedure for MC-CDMA Transmission Systems

A Spreading Sequence Allocation Procedure for MC-CDMA Transmission Systems A Spreadng Sequence Allocaton Procedure for MC-CDMA Transmsson Systems Davd Motter, Damen Castelan Mtsubsh Electrc ITE 80, Avenue des Buttes de Coësmes, 35700 Rennes FRAE e-mal: {motter,castelan}@tcl.te.mee.com

More information

Diversion of Constant Crossover Rate DE\BBO to Variable Crossover Rate DE\BBO\L

Diversion of Constant Crossover Rate DE\BBO to Variable Crossover Rate DE\BBO\L , pp. 207-220 http://dx.do.org/10.14257/jht.2016.9.1.18 Dverson of Constant Crossover Rate DE\BBO to Varable Crossover Rate DE\BBO\L Ekta 1, Mandeep Kaur 2 1 Department of Computer Scence, GNDU, RC, Jalandhar

More information

Monitoring large-scale power distribution grids

Monitoring large-scale power distribution grids Montorng large-scale power dstrbuton grds D. Gavrlov, M. Gouzman, and S. Lury Center for Advanced Technology n Sensor Systems, Stony Brook Unversty, Stony Brook, NY 11794 Keywords: smart grd; sensor network;

More information

All-optical encrypted movie

All-optical encrypted movie All-optcal encrypted move Faban Mosso, 1 John Fredy Barrera, 3 Myran Tebald, 1, Néstor Bolognn, 1,2 and Roberto Torroba 1 1 Centro de Investgacones Óptcas (CONICET La Plata-CIC) and UID OPTIMO, Facultad

More information

Section 5. Signal Conditioning and Data Analysis

Section 5. Signal Conditioning and Data Analysis Secton 5 Sgnal Condtonng and Data Analyss 6/27/2017 Engneerng Measurements 5 1 Common Input Sgnals 6/27/2017 Engneerng Measurements 5 2 1 Analog vs. Dgtal Sgnals 6/27/2017 Engneerng Measurements 5 3 Current

More information

Modeling Hierarchical Event Streams in System Level Performance Analysis

Modeling Hierarchical Event Streams in System Level Performance Analysis Modelng Herarchcal Event Streams n System Level Performance Analyss IK Report 9 obas Ren, Ka Lampka, Lothar hele Computer Engneerng and Networks Laboratory Swss Federal Instsute of echnology (EH) Zurch,

More information