WorldWideScience

Sample records for ct-cdma communication scheme

  1. A CDMA system implementation with dimming control for visible light communication

    Science.gov (United States)

    Chen, Danyang; Wang, Jianping; Jin, Jianli; Lu, Huimin; Feng, Lifang

    2018-04-01

    Visible light communication (VLC), using solid-state lightings to transmit information, has become a complement technology to wireless radio communication. As a realistic multiple access scheme for VLC system, code division multiple access (CDMA) has attracted more and more attentions in recent years. In this paper, we address and implement an improved CDMA scheme for VLC system. The simulation results reveal that the improved CDMA scheme not only supports multi-users' transmission but also maintains dimming value at about 50% and enhances the system efficiency. It can also realize the flexible dimming control by adjusting some parameters of system structure, which rarely affects the system BER performance. A real-time experimental VLC system with improved CDMA scheme is performed based on field programmable gate array (FPGA), reaching a good BER performance.

  2. Iterative Decoding for an Optical CDMA based Laser communication System

    International Nuclear Information System (INIS)

    Kim, Jin Young; Kim, Eun Cheol; Cha, Jae Sang

    2008-01-01

    An optical CDMA(code division multiple access)based Laser communication system has attracted much attention since it requires minimal optical Laser signal processing and it is virtually delay free, while from the theoretical point of view, its performance depends on the auto and cross correlation properties of employed sequences. Various kinds of channel coding schemes for optical CDMA based Laser communication systems have been proposed and analyzed to compensate nonideal channel and receiver conditions in impaired photon channels. In this paper, we propose and analyze an iterative decoding of optical CDMA based Laser communication signals for both shot noise limited and thermal noise limited systems. It is assumed that optical channel is an intensity modulated (IM)channel and direct detection scheme is employed to detect the received optical signal. The performance is evaluated in terms of bit error probability and throughput. It is demonstrated that the BER and throughput performance is substantially improved with interleaver length for a fixed code rate and with alphabet size of PPM (pulse position modulation). Also, the BER and throughput performance is significantly enhanced with the number of iterations for decoding process. The results in this paper can be applied to the optical CDMA based Laser communication network with multiple access applications

  3. Iterative Decoding for an Optical CDMA based Laser communication System

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Jin Young; Kim, Eun Cheol [Kwangwoon Univ., Seoul (Korea, Republic of); Cha, Jae Sang [Seoul National Univ. of Technology, Seoul (Korea, Republic of)

    2008-11-15

    An optical CDMA(code division multiple access)based Laser communication system has attracted much attention since it requires minimal optical Laser signal processing and it is virtually delay free, while from the theoretical point of view, its performance depends on the auto and cross correlation properties of employed sequences. Various kinds of channel coding schemes for optical CDMA based Laser communication systems have been proposed and analyzed to compensate nonideal channel and receiver conditions in impaired photon channels. In this paper, we propose and analyze an iterative decoding of optical CDMA based Laser communication signals for both shot noise limited and thermal noise limited systems. It is assumed that optical channel is an intensity modulated (IM)channel and direct detection scheme is employed to detect the received optical signal. The performance is evaluated in terms of bit error probability and throughput. It is demonstrated that the BER and throughput performance is substantially improved with interleaver length for a fixed code rate and with alphabet size of PPM (pulse position modulation). Also, the BER and throughput performance is significantly enhanced with the number of iterations for decoding process. The results in this paper can be applied to the optical CDMA based Laser communication network with multiple access applications.

  4. Analysis of PPM-CDMA and OPPM-CDMA communication systems with new optical code

    Science.gov (United States)

    Liu, F.; Ghafouri-Shiraz, H.

    2005-11-01

    A novel type of optical spreading sequences, named the 'new-Modified Prime Code (nMPC)', is proposed for use in synchronous direct-detection optical code-division multiple-access (CDMA) systems which employ both pulse position modulation (PPM) and overlapping pulse position modulation (OPPM) schemes. The upper bounds on the bit error rate (BER) for nMPC used in PPM-CDMA systems are derived and compared with the respective systems, using a modified prime code (MPC) and a padded modified prime code (PMPC). The nMPC is further applied to the OPPM-CDMA system and the system with a proposed interference cancellation scheme. Our results show that under the same conditions the PPM-CDMA system performances are more improved with the use of nMPC than with the two other traditional codes. Moreover, they show that the system performances are significantly enhanced by the proposed interference reduction methods, if the nMPC is used in the OPPM-CDMA systems.

  5. Channel coding for underwater acoustic single-carrier CDMA communication system

    Science.gov (United States)

    Liu, Lanjun; Zhang, Yonglei; Zhang, Pengcheng; Zhou, Lin; Niu, Jiong

    2017-01-01

    CDMA is an effective multiple access protocol for underwater acoustic networks, and channel coding can effectively reduce the bit error rate (BER) of the underwater acoustic communication system. For the requirements of underwater acoustic mobile networks based on CDMA, an underwater acoustic single-carrier CDMA communication system (UWA/SCCDMA) based on the direct-sequence spread spectrum is proposed, and its channel coding scheme is studied based on convolution, RA, Turbo and LDPC coding respectively. The implementation steps of the Viterbi algorithm of convolutional coding, BP and minimum sum algorithms of RA coding, Log-MAP and SOVA algorithms of Turbo coding, and sum-product algorithm of LDPC coding are given. An UWA/SCCDMA simulation system based on Matlab is designed. Simulation results show that the UWA/SCCDMA based on RA, Turbo and LDPC coding have good performance such that the communication BER is all less than 10-6 in the underwater acoustic channel with low signal to noise ratio (SNR) from -12 dB to -10dB, which is about 2 orders of magnitude lower than that of the convolutional coding. The system based on Turbo coding with Log-MAP algorithm has the best performance.

  6. Adaptive digital beamforming for a CDMA mobile communications payload

    Science.gov (United States)

    Munoz-Garcia, Samuel G.; Ruiz, Javier Benedicto

    1993-01-01

    In recent years, Spread-Spectrum Code Division Multiple Access (CDMA) has become a very popular access scheme for mobile communications due to a variety of reasons: excellent performance in multipath environments, high scope for frequency reuse, graceful degradation near saturation, etc. In this way, a CDMA system can support simultaneous digital communication among a large community of relatively uncoordinated users sharing a given frequency band. Nevertheless, there are also important problems associated with the use of CDMA. First, in a conventional CDMA scheme, the signature sequences of asynchronous users are not orthogonal and, as the number of active users increases, the self-noise generated by the mutual interference between users considerably degrades the performance, particularly in the return link. Furthermore, when there is a large disparity in received powers - due to differences in slant range or atmospheric attenuation - the non-zero cross-correlation between the signals gives rise to the so-called near-far problem. This leads to an inefficient utilization of the satellite resources and, consequently, to a drastic reduction in capacity. Several techniques were proposed to overcome this problem, such as Synchronized CDMA - in which the signature sequences of the different users are quasi-orthogonal - and power control. At the expense of increased network complexity and user coordination, these techniques enable the system capacity to be restored by equitably sharing the satellite resources among the users. An alternative solution is presented based upon the use of time-reference adaptive digital beamforming on board the satellite. This technique enables a high number of independently steered beams to be generated from a single phased array antenna, which automatically track the desired user signal and null the unwanted interference source. In order to use a time-reference adaptive antenna in a communications system, the main challenge is to obtain a

  7. CDMA

    International Nuclear Information System (INIS)

    Ock, Yun Cheol

    2003-07-01

    This book is comprised of summary of mobile communication : CT, TRS, Cellular mobile communication, digital communication, Is-95 and Friedns and PCS system, Basic concept : tools of mathematics, system, signal analysis of Fourier, Sampling, DB and Bandwidth, noise and OSI 7 Layer, DSSS and Code theory : spread spectrum, CDM/CDMA communication mode, code theory and PN code, CDMA Demodulator : Searcher engine, function by searcher engine, Finger demodulator and searcher task, control power : the reason for forward control power and reverse control power, open loop power control, closed loop power control and outer loop power control, Hand off : Parameter for hand off MASHO, new soft hand off, hard hand off, MAHHO and Access hand off, Radio transmission technique : interleaving and Modulation, Is-95, COMA 2000 : COMA 2000 System, Idle state and registration, vocoder : voice source coding and QCELP

  8. Performance of a Two-Level Call Admission Control Scheme for DS-CDMA Wireless Networks

    Directory of Open Access Journals (Sweden)

    Fapojuwo Abraham O

    2007-01-01

    Full Text Available We propose a two-level call admission control (CAC scheme for direct sequence code division multiple access (DS-CDMA wireless networks supporting multimedia traffic and evaluate its performance. The first-level admission control assigns higher priority to real-time calls (also referred to as class 0 calls in gaining access to the system resources. The second level admits nonreal-time calls (or class 1 calls based on the resources remaining after meeting the resource needs for real-time calls. However, to ensure some minimum level of performance for nonreal-time calls, the scheme reserves some resources for such calls. The proposed two-level CAC scheme utilizes the delay-tolerant characteristic of non-real-time calls by incorporating a queue to temporarily store those that cannot be assigned resources at the time of initial access. We analyze and evaluate the call blocking, outage probability, throughput, and average queuing delay performance of the proposed two-level CAC scheme using Markov chain theory. The analytic results are validated by simulation results. The numerical results show that the proposed two-level CAC scheme provides better performance than the single-level CAC scheme. Based on these results, it is concluded that the proposed two-level CAC scheme serves as a good solution for supporting multimedia applications in DS-CDMA wireless communication systems.

  9. Performance of a Two-Level Call Admission Control Scheme for DS-CDMA Wireless Networks

    Directory of Open Access Journals (Sweden)

    Abraham O. Fapojuwo

    2007-11-01

    Full Text Available We propose a two-level call admission control (CAC scheme for direct sequence code division multiple access (DS-CDMA wireless networks supporting multimedia traffic and evaluate its performance. The first-level admission control assigns higher priority to real-time calls (also referred to as class 0 calls in gaining access to the system resources. The second level admits nonreal-time calls (or class 1 calls based on the resources remaining after meeting the resource needs for real-time calls. However, to ensure some minimum level of performance for nonreal-time calls, the scheme reserves some resources for such calls. The proposed two-level CAC scheme utilizes the delay-tolerant characteristic of non-real-time calls by incorporating a queue to temporarily store those that cannot be assigned resources at the time of initial access. We analyze and evaluate the call blocking, outage probability, throughput, and average queuing delay performance of the proposed two-level CAC scheme using Markov chain theory. The analytic results are validated by simulation results. The numerical results show that the proposed two-level CAC scheme provides better performance than the single-level CAC scheme. Based on these results, it is concluded that the proposed two-level CAC scheme serves as a good solution for supporting multimedia applications in DS-CDMA wireless communication systems.

  10. Downlink Multihop Transmission Technique for Asymmetric Traffic Accommodation in DS-CDMA/FDD Cellular Communications

    Science.gov (United States)

    Mori, Kazuo; Naito, Katsuhiro; Kobayashi, Hideo

    This paper proposes an asymmetric traffic accommodation scheme using a multihop transmission technique for CDMA/FDD cellular communication systems. The proposed scheme exploits the multihop transmission to downlink packet transmissions, which require the large transmission power at their single-hop transmissions, in order to increase the downlink capacity. In these multihop transmissions, vacant uplink band is used for the transmissions from relay stations to destination mobile stations, and this leads more capacity enhancement in the downlink communications. The relay route selection method and power control method for the multihop transmissions are also investigated in the proposed scheme. The proposed scheme is evaluated by computer simulation and the results show that the proposed scheme can achieve better system performance.

  11. Performance Analysis of Wavelet Based MC-CDMA System with Implementation of Various Antenna Diversity Schemes

    OpenAIRE

    Islam, Md. Matiqul; Kabir, M. Hasnat; Ullah, Sk. Enayet

    2012-01-01

    The impact of using wavelet based technique on the performance of a MC-CDMA wireless communication system has been investigated. The system under proposed study incorporates Walsh Hadamard codes to discriminate the message signal for individual user. A computer program written in Mathlab source code is developed and this simulation study is made with implementation of various antenna diversity schemes and fading (Rayleigh and Rician) channel. Computer simulation results demonstrate that the p...

  12. Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti STBC in Different Modulation Schemes

    OpenAIRE

    Shams, Rifat Ara; Kabir, M. Hasnat; Ullah, Sheikh Enayet

    2012-01-01

    In this paper, the impact of Forward Error Correction (FEC) code namely Trellis code with interleaver on the performance of wavelet based MC-CDMA wireless communication system with the implementation of Alamouti antenna diversity scheme has been investigated in terms of Bit Error Rate (BER) as a function of Signal-to-Noise Ratio (SNR) per bit. Simulation of the system under proposed study has been done in M-ary modulation schemes (MPSK, MQAM and DPSK) over AWGN and Rayleigh fading channel inc...

  13. Zero-Forcing and Minimum Mean-Square Error Multiuser Detection in Generalized Multicarrier DS-CDMA Systems for Cognitive Radio

    Directory of Open Access Journals (Sweden)

    Lie-Liang Yang

    2008-01-01

    Full Text Available In wireless communications, multicarrier direct-sequence code-division multiple access (MC DS-CDMA constitutes one of the highly flexible multiple access schemes. MC DS-CDMA employs a high number of degrees-of-freedom, which are beneficial to design and reconfiguration for communications in dynamic communications environments, such as in the cognitive radios. In this contribution, we consider the multiuser detection (MUD in MC DS-CDMA, which motivates lowcomplexity, high flexibility, and robustness so that the MUD schemes are suitable for deployment in dynamic communications environments. Specifically, a range of low-complexity MUDs are derived based on the zero-forcing (ZF, minimum mean-square error (MMSE, and interference cancellation (IC principles. The bit-error rate (BER performance of the MC DS-CDMA aided by the proposed MUDs is investigated by simulation approaches. Our study shows that, in addition to the advantages provided by a general ZF, MMSE, or IC-assisted MUD, the proposed MUD schemes can be implemented using modular structures, where most modules are independent of each other. Due to the independent modular structure, in the proposed MUDs one module may be reconfigured without yielding impact on the others. Therefore, the MC DS-CDMA, in conjunction with the proposed MUDs, constitutes one of the promising multiple access schemes for communications in the dynamic communications environments such as in the cognitive radios.

  14. Zero-Forcing and Minimum Mean-Square Error Multiuser Detection in Generalized Multicarrier DS-CDMA Systems for Cognitive Radio

    Directory of Open Access Journals (Sweden)

    Wang Li-Chun

    2008-01-01

    Full Text Available Abstract In wireless communications, multicarrier direct-sequence code-division multiple access (MC DS-CDMA constitutes one of the highly flexible multiple access schemes. MC DS-CDMA employs a high number of degrees-of-freedom, which are beneficial to design and reconfiguration for communications in dynamic communications environments, such as in the cognitive radios. In this contribution, we consider the multiuser detection (MUD in MC DS-CDMA, which motivates lowcomplexity, high flexibility, and robustness so that the MUD schemes are suitable for deployment in dynamic communications environments. Specifically, a range of low-complexity MUDs are derived based on the zero-forcing (ZF, minimum mean-square error (MMSE, and interference cancellation (IC principles. The bit-error rate (BER performance of the MC DS-CDMA aided by the proposed MUDs is investigated by simulation approaches. Our study shows that, in addition to the advantages provided by a general ZF, MMSE, or IC-assisted MUD, the proposed MUD schemes can be implemented using modular structures, where most modules are independent of each other. Due to the independent modular structure, in the proposed MUDs one module may be reconfigured without yielding impact on the others. Therefore, the MC DS-CDMA, in conjunction with the proposed MUDs, constitutes one of the promising multiple access schemes for communications in the dynamic communications environments such as in the cognitive radios.

  15. A Review on Successive Interference Cancellation Scheme Based on Optical CDMA Network

    Science.gov (United States)

    Alsowaidi, N.; Eltaif, T.; Mokhtar, M. R.

    2014-12-01

    Due to various desirable features of optical code division multiple access (OCDMA), it is believed this technique once developed and commercially available will be an integral part of optical access networks. Optical CDMA system suffers from a problem called multiple access interference (MAI) which limits the number of active users, it occurs when number of active users share the same carriers. The aim of this paper is to review successive interference cancellation (SIC) scheme based on optical CDMA system. The paper also reviews the system performance in presence of shot noise, thermal noise, and phase-induced intensity noise (PIIN). A comprehensive review on the mathematical model of SIC scheme using direct detection (DS) and spectral amplitude coding (SAC) were presented in this article.

  16. Design and performance analysis for several new classes of codes for optical synchronous CDMA and for arbitrary-medium time-hopping synchronous CDMA communication systems

    Science.gov (United States)

    Kostic, Zoran; Titlebaum, Edward L.

    1994-08-01

    New families of spread-spectrum codes are constructed, that are applicable to optical synchronous code-division multiple-access (CDMA) communications as well as to arbitrary-medium time-hopping synchronous CDMA communications. Proposed constructions are based on the mappings from integer sequences into binary sequences. We use the concept of number theoretic quadratic congruences and a subset of Reed-Solomon codes similar to the one utilized in the Welch-Costas frequency-hop (FH) patterns. The properties of the codes are as good as or better than the properties of existing codes for synchronous CDMA communications: Both the number of code-sequences within a single code family and the number of code families with good properties are significantly increased when compared to the known code designs. Possible applications are presented. To evaluate the performance of the proposed codes, a new class of hit arrays called cyclical hit arrays is recalled, which give insight into the previously unknown properties of the few classes of number theoretic FH patterns. Cyclical hit arrays and the proposed mappings are used to determine the exact probability distribution functions of random variables that represent interference between users of a time-hopping or optical CDMA system. Expressions for the bit error probability in multi-user CDMA systems are derived as a function of the number of simultaneous CDMA system users, the length of signature sequences and the threshold of a matched filter detector. The performance results are compared with the results for some previously known codes.

  17. Why is CDMA the solution for mobile satellite communication

    Science.gov (United States)

    Gilhousen, Klein S.; Jacobs, Irwin M.; Padovani, Roberto; Weaver, Lindsay A.

    1989-01-01

    It is demonstrated that spread spectrum Code Division Multiple Access (CDMA) systems provide an economically superior solution to satellite mobile communications by increasing the system maximum capacity with respect to single channel per carrier Frequency Division Multiple Access (FDMA) systems. Following the comparative analysis of CDMA and FDMA systems, the design of a model that was developed to test the feasibility of the approach and the performance of a spread spectrum system in a mobile environment. Results of extensive computer simulations as well as laboratory and field tests results are presented.

  18. Adaptive Space-Time-Spreading-Assisted Wideband CDMA Systems Communicating over Dispersive Nakagami- Fading Channels

    Directory of Open Access Journals (Sweden)

    Yang Lie-Liang

    2005-01-01

    Full Text Available In this contribution, the performance of wideband code-division multiple-access (W-CDMA systems using space-time-spreading- (STS- based transmit diversity is investigated, when frequency-selective Nakagami- fading channels, multiuser interference, and background noise are considered. The analysis and numerical results suggest that the achievable diversity order is the product of the frequency-selective diversity order and the transmit diversity order. Furthermore, both the transmit diversity and the frequency-selective diversity have the same order of importance. Since W-CDMA signals are subjected to frequency-selective fading, the number of resolvable paths at the receiver may vary over a wide range depending on the transmission environment encountered. It can be shown that, for wireless channels where the frequency selectivity is sufficiently high, transmit diversity may be not necessitated. Under this case, multiple transmission antennas can be leveraged into an increased bitrate. Therefore, an adaptive STS-based transmission scheme is then proposed for improving the throughput of W-CDMA systems. Our numerical results demonstrate that this adaptive STS-based transmission scheme is capable of significantly improving the effective throughput of W-CDMA systems. Specifically, the studied W-CDMA system's bitrate can be increased by a factor of three at the modest cost of requiring an extra 0.4 dB or 1.2 dB transmitted power in the context of the investigated urban or suburban areas, respectively.

  19. Space-Time Chip Equalization for Maximum Diversity Space-Time Block Coded DS-CDMA Downlink Transmission

    Directory of Open Access Journals (Sweden)

    Petré Frederik

    2004-01-01

    Full Text Available In the downlink of DS-CDMA, frequency-selectivity destroys the orthogonality of the user signals and introduces multiuser interference (MUI. Space-time chip equalization is an efficient tool to restore the orthogonality of the user signals and suppress the MUI. Furthermore, multiple-input multiple-output (MIMO communication techniques can result in a significant increase in capacity. This paper focuses on space-time block coding (STBC techniques, and aims at combining STBC techniques with the original single-antenna DS-CDMA downlink scheme. This results into the so-called space-time block coded DS-CDMA downlink schemes, many of which have been presented in the past. We focus on a new scheme that enables both the maximum multiantenna diversity and the maximum multipath diversity. Although this maximum diversity can only be collected by maximum likelihood (ML detection, we pursue suboptimal detection by means of space-time chip equalization, which lowers the computational complexity significantly. To design the space-time chip equalizers, we also propose efficient pilot-based methods. Simulation results show improved performance over the space-time RAKE receiver for the space-time block coded DS-CDMA downlink schemes that have been proposed for the UMTS and IS-2000 W-CDMA standards.

  20. An Improved Overloading Scheme for Downlink CDMA

    Directory of Open Access Journals (Sweden)

    Marc Moeneclaey

    2005-04-01

    Full Text Available An improved overloading scheme is presented for single-user detection in the downlink of multiple-access systems based on OCDMA/OCDMA (O/O. By displacing in time the orthogonal signatures of the two user sets that make up the overloaded system, the cross-correlation between the users of the two sets is reduced. For random O/O with square-root cosine rolloff chip pulses, the multiuser interference can be decreased by up to 50% (depending on the chip pulse bandwidth as compared to quasiorthogonal sequences (QOS that are presently part of the downlink standard of Cdma2000. This reduction of the multiuser interference gives rise to an increase of the achievable signal-to-interference-plus-noise ratio for a particular channel load.

  1. Quadriphase DS-CDMA wireless communication systems employing the generalized detector

    Science.gov (United States)

    Tuzlukov, Vyacheslav

    2012-05-01

    Probability of bit-error Per performance of asynchronous direct-sequence code-division multiple-access (DS-CDMA) wireless communication systems employing the generalized detector (GD) constructed based on the generalized approach to signal processing in noise is analyzed. The effects of pulse shaping, quadriphase or direct sequence quadriphase shift keying (DS-QPSK) spreading, aperiodic spreading sequences are considered in DS-CDMA based on GD and compared with the coherent Neyman-Pearson receiver. An exact Per expression and several approximations: one using the characterristic function method, a simplified expression for the improved Gaussian approximation (IGA) and the simplified improved Gaussian approximation are derived. Under conditions typically satisfied in practice and even with a small number of interferers, the standard Gaussian approximation (SGA) for the multiple-access interference component of the GD statistic and Per performance is shown to be accurate. Moreover, the IGA is shown to reduce to the SGA for pulses with zero excess bandwidth. Second, the GD Per performance of quadriphase DS-CDMA is shown to be superior to that of bi-phase DS-CDMA. Numerical examples by Monte Carlo simulation are presented to illustrate the GD Per performance for square-root raised-cosine pulses and spreading factors of moderate to large values. Also, a superiority of GD employment in CDMA systems over the Neyman-Pearson receiver is demonstrated

  2. Cross-Layer Design and Analysis of Downlink Communications in Cellular CDMA Systems

    Directory of Open Access Journals (Sweden)

    Sun Jin Yuan

    2006-01-01

    Full Text Available A cellular CDMA network with voice and data communications is considered. Focusing on the downlink direction, we seek for the overall performance improvement which can be achieved by cross-layer analysis and design, taking physical layer, link layer, network layer, and transport layer into account. We are concerned with the role of each single layer as well as the interaction among layers, and propose algorithms/schemes accordingly to improve the system performance. These proposals include adaptive scheduling for link layer, priority-based handoff strategy for network admission control, and an algorithm for the avoidance of TCP spurious timeouts at the transport layer. Numerical results show the performance gain of each proposed scheme over independent performance of an individual layer in the wireless mobile network. We conclude that the system performance in terms of capacity, throughput, dropping probability, outage, power efficiency, delay, and fairness can be enhanced by jointly considering the interactions across layers.

  3. A Unified Approach to the Analysis of Multicarrier DS-CDMA over Nakagami-$M$ Fading Channels

    OpenAIRE

    Yang, L-L.; Hanzo, L.

    2001-01-01

    A class of unified multicarrier DS-CDMA (MC DS-CDMA) schemes is defined and its performance is considered over multipath Nakagami-$M$ fading channels. The spacing between two adjacent subcarriers of the unified MC DS-CDMA scheme is a variable, allowing us to gain insight into the effects of the spacing on the bit error rate (BER) performance of MC DS-CDMA systems. This unified MC DS-CDMA scheme includes the subclasses of multitone DS-CDMA and orthogonal MC DS-CDMA as special cases. The optimu...

  4. Performance of Generalized Multicarrier DS-CDMA over Nakagami-$m$ Fading Channels

    OpenAIRE

    Yang, L-L.; Hanzo, L.

    2002-01-01

    A class of generalized multicarrier direct sequence code-division multiple-access (MC DS-CDMA) schemes is defined and its performance is considered over multipath Nakagamifading channels. The spacing between two adjacent subcarriers of the generalized MC DS-CDMA is a variable, allowing us to gain insight into the effects of the spacing on the bit error rate (BER) performance of MC DS-CDMA systems. This generalized MC DS-CDMA scheme includes the subclasses of multitone DS-CDMA and orthogonal M...

  5. Symbol and Bit Error Rates Analysis of Hybrid PIM-CDMA

    Directory of Open Access Journals (Sweden)

    Ghassemlooy Z

    2005-01-01

    Full Text Available A hybrid pulse interval modulation code-division multiple-access (hPIM-CDMA scheme employing the strict optical orthogonal code (SOCC with unity and auto- and cross-correlation constraints for indoor optical wireless communications is proposed. In this paper, we analyse the symbol error rate (SER and bit error rate (BER of hPIM-CDMA. In the analysis, we consider multiple access interference (MAI, self-interference, and the hybrid nature of the hPIM-CDMA signal detection, which is based on the matched filter (MF. It is shown that the BER/SER performance can only be evaluated if the bit resolution conforms to the condition set by the number of consecutive false alarm pulses that might occur and be detected, so that one symbol being divided into two is unlikely to occur. Otherwise, the probability of SER and BER becomes extremely high and indeterminable. We show that for a large number of users, the BER improves when increasing the code weight . The results presented are compared with other modulation schemes.

  6. Performance Analysis of a New Coded TH-CDMA Scheme in Dispersive Infrared Channel with Additive Gaussian Noise

    Science.gov (United States)

    Hamdi, Mazda; Kenari, Masoumeh Nasiri

    2013-06-01

    We consider a time-hopping based multiple access scheme introduced in [1] for communication over dispersive infrared links, and evaluate its performance for correlator and matched filter receivers. In the investigated time-hopping code division multiple access (TH-CDMA) method, the transmitter benefits a low rate convolutional encoder. In this method, the bit interval is divided into Nc chips and the output of the encoder along with a PN sequence assigned to the user determines the position of the chip in which the optical pulse is transmitted. We evaluate the multiple access performance of the system for correlation receiver considering background noise which is modeled as White Gaussian noise due to its large intensity. For the correlation receiver, the results show that for a fixed processing gain, at high transmit power, where the multiple access interference has the dominant effect, the performance improves by the coding gain. But at low transmit power, in which the increase of coding gain leads to the decrease of the chip time, and consequently, to more corruption due to the channel dispersion, there exists an optimum value for the coding gain. However, for the matched filter, the performance always improves by the coding gain. The results show that the matched filter receiver outperforms the correlation receiver in the considered cases. Our results show that, for the same bandwidth and bit rate, the proposed system excels other multiple access techniques, like conventional CDMA and time hopping scheme.

  7. An efficient digital signal processing method for RRNS-based DS-CDMA systems

    Directory of Open Access Journals (Sweden)

    Peter Olsovsky

    2017-09-01

    Full Text Available This paper deals with an efficient method for achieving low power and high speed in advanced Direct-Sequence Code Division Multiple-Access (DS-CDMA wireless communication systems based on the Residue Number System (RNS. A modified algorithm for multiuser DS-CDMA signal generation in MATLAB is proposed and investigated. The most important characteristics of the generated PN code are also presented. Subsequently, a DS-CDMA system based on the combination of the RNS or the so-called Redundant Residue Number System (RRNS is proposed. The enhanced method using a spectrally efficient 8-PSK data modulation scheme to improve the bandwidth efficiency for RRNS-based DS-CDMA systems is presented. By using the C-measure (complexity measure of the error detection function, it is possible to estimate the size of the circuit. Error detection function in RRNSs can be efficiently implemented by LookUp Table (LUT cascades.

  8. Physical Layer Built-In Security Analysis and Enhancement Algorithms for CDMA Systems

    Directory of Open Access Journals (Sweden)

    Li Tongtong

    2007-01-01

    Full Text Available Historically developed for secure communication and military use, CDMA has been identified as a major modulation and multiple-access technique for 3G systems and beyond. In addition to the wide bandwidth and low power-spectrum density which make CDMA signals robust to narrowband jamming and easy to be concealed within the noise floor, the physical layer built-in information privacy of CDMA system is provided by pseudorandom scrambling. In this paper, first, security weakness of the operational and proposed CDMA airlink interfaces is analyzed. Second, based on the advanced encryption standard (AES, we propose to enhance the physical layer built-in security of CDMA systems through secure scrambling. Performance analysis demonstrates that while providing significantly improved information privacy, CDMA systems with secure scrambling have comparable computational complexity and overall system performance with that of conventionally scrambled systems. Moreover, it is shown that by scrambling the training sequence and the message sequence separately with two independent scrambling sequences, both information privacy and system performance can be further improved. The proposed scheme can readily be applied to 3G systems and beyond.

  9. Performance Comparison of Orthogonal and Quasi-orthogonal Codes in Quasi-Synchronous Cellular CDMA Communication

    Science.gov (United States)

    Jos, Sujit; Kumar, Preetam; Chakrabarti, Saswat

    Orthogonal and quasi-orthogonal codes are integral part of any DS-CDMA based cellular systems. Orthogonal codes are ideal for use in perfectly synchronous scenario like downlink cellular communication. Quasi-orthogonal codes are preferred over orthogonal codes in the uplink communication where perfect synchronization cannot be achieved. In this paper, we attempt to compare orthogonal and quasi-orthogonal codes in presence of timing synchronization error. This will give insight into the synchronization demands in DS-CDMA systems employing the two classes of sequences. The synchronization error considered is smaller than chip duration. Monte-Carlo simulations have been carried out to verify the analytical and numerical results.

  10. Differential Space-Time Block Code Modulation for DS-CDMA Systems

    Directory of Open Access Journals (Sweden)

    Liu Jianhua

    2002-01-01

    Full Text Available A differential space-time block code (DSTBC modulation scheme is used to improve the performance of DS-CDMA systems in fast time-dispersive fading channels. The resulting scheme is referred to as the differential space-time block code modulation for DS-CDMA (DSTBC-CDMA systems. The new modulation and demodulation schemes are especially studied for the down-link transmission of DS-CDMA systems. We present three demodulation schemes, referred to as the differential space-time block code Rake (D-Rake receiver, differential space-time block code deterministic (D-Det receiver, and differential space-time block code deterministic de-prefix (D-Det-DP receiver, respectively. The D-Det receiver exploits the known information of the spreading sequences and their delayed paths deterministically besides the Rake type combination; consequently, it can outperform the D-Rake receiver, which employs the Rake type combination only. The D-Det-DP receiver avoids the effect of intersymbol interference and hence can offer better performance than the D-Det receiver.

  11. Optical CDMA components requirements

    Science.gov (United States)

    Chan, James K.

    1998-08-01

    Optical CDMA is a complementary multiple access technology to WDMA. Optical CDMA potentially provides a large number of virtual optical channels for IXC, LEC and CLEC or supports a large number of high-speed users in LAN. In a network, it provides asynchronous, multi-rate, multi-user communication with network scalability, re-configurability (bandwidth on demand), and network security (provided by inherent CDMA coding). However, optical CDMA technology is less mature in comparison to WDMA. The components requirements are also different from WDMA. We have demonstrated a video transport/switching system over a distance of 40 Km using discrete optical components in our laboratory. We are currently pursuing PIC implementation. In this paper, we will describe the optical CDMA concept/features, the demonstration system, and the requirements of some critical optical components such as broadband optical source, broadband optical amplifier, spectral spreading/de- spreading, and fixed/programmable mask.

  12. On capacity tradeoffs in secure DS-CDMA packet communications with QOS constraints

    International Nuclear Information System (INIS)

    Sattar, F.; Mufti, M.

    2012-01-01

    This paper presents a mathematical framework for analysis of effect of counter mode (CTR) encryption on the traffic capacity of packet communication systems based on direct-sequence, code-division, multiple-access (DS-CDMA). We specify QoS constraints in terms of minimum acceptable mean opinion score (MOS) of voice payload, maximum permissible resource utilization for CTR-mode re-keying and DS-CDMA processing gain. We quantify the trade-offs in system capacity as a function of these constraints. Results show that application of CTR encryption causes error expansion and respecting the QoS constraints while satisfying the desired encryption parameters results in reduction of traffic capacity. (author)

  13. A Low-Complexity Joint Synchronization and Detection Algorithm for Single-Band DS-CDMA UWB Communications

    DEFF Research Database (Denmark)

    Christensen, Lars P.B.

    2005-01-01

    The problem of asynchronous direct-sequence code division multiple access (DS-CDMA) detection over the ultra-wideband (UWB) multipath channel is considered. A joint synchronization, channel-estimation and multi-user detection scheme based on the adaptive linear minimum mean-square error (LMMSE...

  14. Sequence Selection and Performance in DS/CDMA Systems

    Directory of Open Access Journals (Sweden)

    Jefferson Santos Ambrosio

    2016-03-01

    Full Text Available In this work key concepts on coding division multiple access (CDMA communication systems have been discussed. The sequence selection impact on the performance and capacity of direct sequence CDMA (DS/CDMA systems under AWGN and increasing system loading, as well as under multiple antennas channels was investigated.

  15. Space-Time Coded MC-CDMA: Blind Channel Estimation, Identifiability, and Receiver Design

    Directory of Open Access Journals (Sweden)

    Li Hongbin

    2002-01-01

    Full Text Available Integrating the strengths of multicarrier (MC modulation and code division multiple access (CDMA, MC-CDMA systems are of great interest for future broadband transmissions. This paper considers the problem of channel identification and signal combining/detection schemes for MC-CDMA systems equipped with multiple transmit antennas and space-time (ST coding. In particular, a subspace based blind channel identification algorithm is presented. Identifiability conditions are examined and specified which guarantee unique and perfect (up to a scalar channel estimation when knowledge of the noise subspace is available. Several popular single-user based signal combining schemes, namely the maximum ratio combining (MRC and the equal gain combining (EGC, which are often utilized in conventional single-transmit-antenna based MC-CDMA systems, are extended to the current ST-coded MC-CDMA (STC-MC-CDMA system to perform joint combining and decoding. In addition, a linear multiuser minimum mean-squared error (MMSE detection scheme is also presented, which is shown to outperform the MRC and EGC at some increased computational complexity. Numerical examples are presented to evaluate and compare the proposed channel identification and signal detection/combining techniques.

  16. Performance Analysis of New Binary User Codes for DS-CDMA Communication

    Science.gov (United States)

    Usha, Kamle; Jaya Sankar, Kottareddygari

    2016-03-01

    This paper analyzes new binary spreading codes through correlation properties and also presents their performance over additive white Gaussian noise (AWGN) channel. The proposed codes are constructed using gray and inverse gray codes. In this paper, a n-bit gray code appended by its n-bit inverse gray code to construct the 2n-length binary user codes are discussed. Like Walsh codes, these binary user codes are available in sizes of power of two and additionally code sets of length 6 and their even multiples are also available. The simple construction technique and generation of code sets of different sizes are the salient features of the proposed codes. Walsh codes and gold codes are considered for comparison in this paper as these are popularly used for synchronous and asynchronous multi user communications respectively. In the current work the auto and cross correlation properties of the proposed codes are compared with those of Walsh codes and gold codes. Performance of the proposed binary user codes for both synchronous and asynchronous direct sequence CDMA communication over AWGN channel is also discussed in this paper. The proposed binary user codes are found to be suitable for both synchronous and asynchronous DS-CDMA communication.

  17. A Charrelation Matrix-Based Blind Adaptive Detector for DS-CDMA Systems

    Directory of Open Access Journals (Sweden)

    Zhongqiang Luo

    2015-08-01

    Full Text Available In this paper, a blind adaptive detector is proposed for blind separation of user signals and blind estimation of spreading sequences in DS-CDMA systems. The blind separation scheme exploits a charrelation matrix for simple computation and effective extraction of information from observation signal samples. The system model of DS-CDMA signals is modeled as a blind separation framework. The unknown user information and spreading sequence of DS-CDMA systems can be estimated only from the sampled observation signals. Theoretical analysis and simulation results show that the improved performance of the proposed algorithm in comparison with the existing conventional algorithms used in DS-CDMA systems. Especially, the proposed scheme is suitable for when the number of observation samples is less and the signal to noise ratio (SNR is low.

  18. A Charrelation Matrix-Based Blind Adaptive Detector for DS-CDMA Systems.

    Science.gov (United States)

    Luo, Zhongqiang; Zhu, Lidong

    2015-08-14

    In this paper, a blind adaptive detector is proposed for blind separation of user signals and blind estimation of spreading sequences in DS-CDMA systems. The blind separation scheme exploits a charrelation matrix for simple computation and effective extraction of information from observation signal samples. The system model of DS-CDMA signals is modeled as a blind separation framework. The unknown user information and spreading sequence of DS-CDMA systems can be estimated only from the sampled observation signals. Theoretical analysis and simulation results show that the improved performance of the proposed algorithm in comparison with the existing conventional algorithms used in DS-CDMA systems. Especially, the proposed scheme is suitable for when the number of observation samples is less and the signal to noise ratio (SNR) is low.

  19. First satellite mobile communication trials using BLQS-CDMA

    Science.gov (United States)

    Luzdemateo, Maria; Johns, Simon; Dothey, Michel; Vanhimbeeck, Carl; Deman, Ivan; Wery, Bruno

    1993-01-01

    In this paper, technical results obtained in the first MSBN Land mobile technical trial are reported. MSBN (Mobile Satellite Business Network) is a new program undertaken by the European Space Agency (ESA) to promote mobile satellite communication in Europe, in particular voice capability. The first phase of the MSBN system implementation plan is an experimental phase. Its purpose is to evaluate through field experiments the performance of the MSBN system prior to finalization of its specifications. Particularly, the objective is to verify in the field and possibly improve the performance of the novel satellite access technique BLQS-CDMA (Band Limited Quasi-Synchronous-Code Division Multiple Access), which is proposed as baseline for the MSBN.

  20. Combined Effect of Random Transmit Power Control and Inter-Path Interference Cancellation on DS-CDMA Packet Mobile Communications

    Science.gov (United States)

    Kudoh, Eisuke; Ito, Haruki; Wang, Zhisen; Adachi, Fumiyuki

    In mobile communication systems, high speed packet data services are demanded. In the high speed data transmission, throughput degrades severely due to severe inter-path interference (IPI). Recently, we proposed a random transmit power control (TPC) to increase the uplink throughput of DS-CDMA packet mobile communications. In this paper, we apply IPI cancellation in addition to the random TPC. We derive the numerical expression of the received signal-to-interference plus noise power ratio (SINR) and introduce IPI cancellation factor. We also derive the numerical expression of system throughput when IPI is cancelled ideally to compare with the Monte Carlo numerically evaluated system throughput. Then we evaluate, by Monte-Carlo numerical computation method, the combined effect of random TPC and IPI cancellation on the uplink throughput of DS-CDMA packet mobile communications.

  1. Secure Communications in High Speed Fiber Optical Networks Using Code Division Multiple Access (CDMA) Transmission

    Energy Technology Data Exchange (ETDEWEB)

    Han, I; Bond, S; Welty, R; Du, Y; Yoo, S; Reinhardt, C; Behymer, E; Sperry, V; Kobayashi, N

    2004-02-12

    This project is focused on the development of advanced components and system technologies for secure data transmission on high-speed fiber optic data systems. This work capitalizes on (1) a strong relationship with outstanding faculty at the University of California-Davis who are experts in high speed fiber-optic networks, (2) the realization that code division multiple access (CDMA) is emerging as a bandwidth enhancing technique for fiber optic networks, (3) the realization that CDMA of sufficient complexity forms the basis for almost unbreakable one-time key transmissions, (4) our concepts for superior components for implementing CDMA, (5) our expertise in semiconductor device processing and (6) our Center for Nano and Microtechnology, which is where the majority of the experimental work was done. Here we present a novel device concept, which will push the limits of current technology, and will simultaneously solve system implementation issues by investigating new state-of-the-art fiber technologies. This will enable the development of secure communication systems for the transmission and reception of messages on deployed commercial fiber optic networks, through the CDMA phase encoding of broad bandwidth pulses. CDMA technology has been developed as a multiplexing technology, much like wavelength division multiplexing (WDM) or time division multiplexing (TDM), to increase the potential number of users on a given communication link. A novel application of the techniques created for CDMA is to generate secure communication through physical layer encoding. Physical layer encoding devices are developed which utilize semiconductor waveguides with fast carrier response times to phase encode spectral components of a secure signal. Current commercial technology, most commonly a spatial light modulator, allows phase codes to be changed at rates of only 10's of Hertz ({approx}25ms response). The use of fast (picosecond to nanosecond) carrier dynamics of semiconductors

  2. High security chaotic multiple access scheme for visible light communication systems with advanced encryption standard interleaving

    Science.gov (United States)

    Qiu, Junchao; Zhang, Lin; Li, Diyang; Liu, Xingcheng

    2016-06-01

    Chaotic sequences can be applied to realize multiple user access and improve the system security for a visible light communication (VLC) system. However, since the map patterns of chaotic sequences are usually well known, eavesdroppers can possibly derive the key parameters of chaotic sequences and subsequently retrieve the information. We design an advanced encryption standard (AES) interleaving aided multiple user access scheme to enhance the security of a chaotic code division multiple access-based visible light communication (C-CDMA-VLC) system. We propose to spread the information with chaotic sequences, and then the spread information is interleaved by an AES algorithm and transmitted over VLC channels. Since the computation complexity of performing inverse operations to deinterleave the information is high, the eavesdroppers in a high speed VLC system cannot retrieve the information in real time; thus, the system security will be enhanced. Moreover, we build a mathematical model for the AES-aided VLC system and derive the theoretical information leakage to analyze the system security. The simulations are performed over VLC channels, and the results demonstrate the effectiveness and high security of our presented AES interleaving aided chaotic CDMA-VLC system.

  3. Performance of an Orthogonal Multicarrier CDMA System in a Multicell/Multipath Environment

    Energy Technology Data Exchange (ETDEWEB)

    Yoon, W.S. [Ajou University, Suwon (Korea)

    1999-08-01

    We have considered an improved orthogonal multicarrier (MC) CDMA system. This system combines the advantages of both DS-CDMA with a concatenated spreading scheme and an MC modulation technique to combat the effects of a multipath fading channel and intersymbol interference (IS). The performance of the system is analyzed under a multicell, multiuser, and multipath Rician fading channel. The system is shown to outperform the orthogonal MC-CDMA system with a conventional PN sequence. (author). 4 refs., 3 figs.

  4. Development of a mobile emergency patient information and imaging communication system based on CDMA-1X EVDO

    Science.gov (United States)

    Yang, Keon Ho; Jung, Haijo; Kang, Won-Suk; Jang, Bong Mun; Kim, Joong Il; Han, Dong Hoon; Yoo, Sun-Kook; Yoo, Hyung-Sik; Kim, Hee-Joung

    2006-03-01

    The wireless mobile service with a high bit rate using CDMA-1X EVDO is now widely used in Korea. Mobile devices are also increasingly being used as the conventional communication mechanism. We have developed a web-based mobile system that communicates patient information and images, using CDMA-1X EVDO for emergency diagnosis. It is composed of a Mobile web application system using the Microsoft Windows 2003 server and an internet information service. Also, a mobile web PACS used for a database managing patient information and images was developed by using Microsoft access 2003. A wireless mobile emergency patient information and imaging communication system is developed by using Microsoft Visual Studio.NET, and JPEG 2000 ActiveX control for PDA phone was developed by using the Microsoft Embedded Visual C++. Also, the CDMA-1X EVDO is used for connections between mobile web servers and the PDA phone. This system allows fast access to the patient information database, storing both medical images and patient information anytime and anywhere. Especially, images were compressed into a JPEG2000 format and transmitted from a mobile web PACS inside the hospital to the radiologist using a PDA phone located outside the hospital. Also, this system shows radiological images as well as physiological signal data, including blood pressure, vital signs and so on, in the web browser of the PDA phone so radiologists can diagnose more effectively. Also, we acquired good results using an RW-6100 PDA phone used in the university hospital system of the Sinchon Severance Hospital in Korea.

  5. Contribution to Synchronization and Tracking Modelisation in a CDMA Receiver

    Directory of Open Access Journals (Sweden)

    Aicha Alami Hassani

    2013-01-01

    Full Text Available We propose and analyze a noncoherent receiver with PN code tracking for direct sequence code division multiple access (DS-CDMA communication systems. We employ the delay-lock loop (DLL architectures for the tracking stage. The choice of DLL parameters is studied with special focus on DS-CDMA communication systems and orthogonality conditions. We described the modeling and simulation of the NCO using hardware description language VHDL. Details of the VHDL implementation are shown.

  6. CDMA systems capacity engineering

    CERN Document Server

    Kim, Kiseon

    2004-01-01

    This new hands-on resource tackles capacity planning and engineering issues that are crucial to optimizing wireless communication systems performance. Going beyond the system physical level and investigating CDMA system capacity at the service level, this volume is the single-source for engineering and analyzing systems capacity and resources.

  7. Performance analysis of a handoff scheme for two-tier cellular CDMA networks

    Directory of Open Access Journals (Sweden)

    Ahmed Hamad

    2011-07-01

    Full Text Available A two-tier model is used in cellular networks to improve the Quality of Service (QoS, namely to reduce the blocking probability of new calls and the forced termination probability of ongoing calls. One tier, the microcells, is used for slow or stationary users, and the other, the macrocell, is used for high speed users. In Code-Division Multiple-Access (CDMA cellular systems, soft handoffs are supported, which provides ways for further QoS improvement. In this paper, we introduce such a way; namely, a channel borrowing scheme used in conjunction with a First-In-First-Out (FIFO queue in the macrocell tier. A multidimensional Markov chain to model the resulting system is established, and an iterative technique to find the steady-state probability distribution is utilized. This distribution is then used to find the performance measures of interest: new call blocking probability, and forced termination probability.

  8. A Low-Complexity Joint Synchronization and Detection Algorithm for Single-Band DS-CDMA UWB Communications

    Directory of Open Access Journals (Sweden)

    Christensen Lars PB

    2005-01-01

    Full Text Available The problem of asynchronous direct-sequence code-division multiple-access (DS-CDMA detection over the ultra-wideband (UWB multipath channel is considered. A joint synchronization, channel-estimation, and multiuser detection scheme based on the adaptive linear minimum mean square error (LMMSE receiver is presented and evaluated. Further, a novel nonrecursive least-squares algorithm capable of reducing the complexity of the adaptation in the receiver while preserving the advantages of the recursive least-squares (RLS algorithm is presented.

  9. Compensating for Channel Fading in DS-CDMA Communication Systems Employing ICA Neural Network Detectors

    Directory of Open Access Journals (Sweden)

    David Overbye

    2005-06-01

    Full Text Available In this paper we examine the impact of channel fading on the bit error rate of a DS-CDMA communication system. The system employs detectors that incorporate neural networks effecting methods of independent component analysis (ICA, subspace estimation of channel noise, and Hopfield type neural networks. The Rayleigh fading channel model is used. When employed in a Rayleigh fading environment, the ICA neural network detectors that give superior performance in a flat fading channel did not retain this superior performance. We then present a new method of compensating for channel fading based on the incorporation of priors in the ICA neural network learning algorithms. When the ICA neural network detectors were compensated using the incorporation of priors, they give significantly better performance than the traditional detectors and the uncompensated ICA detectors. Keywords: CDMA, Multi-user Detection, Rayleigh Fading, Multipath Detection, Independent Component Analysis, Prior Probability Hebbian Learning, Natural Gradient

  10. Nonlinear Multiuser Receiver for Optimized Chaos-Based DS-CDMA Systems

    Directory of Open Access Journals (Sweden)

    S. Shaerbaf

    2011-09-01

    Full Text Available Chaos based communications have drawn increasing attention over the past years. Chaotic signals are derived from non-linear dynamic systems. They are aperiodic, broadband and deterministic signals that appear random in the time domain. Because of these properties, chaotic signals have been proposed to generate spreading sequences for wide-band secure communication recently. Like conventional DS-CDMA systems, chaos-based CDMA systems suffer from multi-user interference (MUI due to other users transmitting in the cell. In this paper, we propose a novel method based on radial basis function (RBF for both blind and non-blind multiuser detection in chaos-based DS-CDMA systems. We also propose a new method for optimizing generation of binary chaotic sequences using Genetic Algorithm. Simulation results show that our proposed nonlinear receiver with optimized chaotic sequences outperforms in comparison to other conventional detectors such as a single-user detector, decorrelating detector and minimum mean square error detector, particularly for under-loaded CDMA condition, which the number of active users is less than processing gain.

  11. Blind information-theoretic multiuser detection algorithms for DS-CDMA and WCDMA downlink systems.

    Science.gov (United States)

    Waheed, Khuram; Salem, Fathi M

    2005-07-01

    Code division multiple access (CDMA) is based on the spread-spectrum technology and is a dominant air interface for 2.5G, 3G, and future wireless networks. For the CDMA downlink, the transmitted CDMA signals from the base station (BS) propagate through a noisy multipath fading communication channel before arriving at the receiver of the user equipment/mobile station (UE/MS). Classical CDMA single-user detection (SUD) algorithms implemented in the UE/MS receiver do not provide the required performance for modern high data-rate applications. In contrast, multi-user detection (MUD) approaches require a lot of a priori information not available to the UE/MS. In this paper, three promising adaptive Riemannian contra-variant (or natural) gradient based user detection approaches, capable of handling the highly dynamic wireless environments, are proposed. The first approach, blind multiuser detection (BMUD), is the process of simultaneously estimating multiple symbol sequences associated with all the users in the downlink of a CDMA communication system using only the received wireless data and without any knowledge of the user spreading codes. This approach is applicable to CDMA systems with relatively short spreading codes but becomes impractical for systems using long spreading codes. We also propose two other adaptive approaches, namely, RAKE -blind source recovery (RAKE-BSR) and RAKE-principal component analysis (RAKE-PCA) that fuse an adaptive stage into a standard RAKE receiver. This adaptation results in robust user detection algorithms with performance exceeding the linear minimum mean squared error (LMMSE) detectors for both Direct Sequence CDMA (DS-CDMA) and wide-band CDMA (WCDMA) systems under conditions of congestion, imprecise channel estimation and unmodeled multiple access interference (MAI).

  12. Subcarrier Group Assignment for MC-CDMA Wireless Networks

    Directory of Open Access Journals (Sweden)

    Le-Ngoc Tho

    2007-01-01

    Full Text Available Two interference-based subcarrier group assignment strategies in dynamic resource allocation are proposed for MC-CDMA wireless systems to achieve high throughput in a multicell environment. Least interfered group assignment (LIGA selects for each session the subcarrier group on which the user receives the minimum interference, while best channel ratio group assignment (BCRGA chooses the subcarrier group with the largest channel response-to-interference ratio. Both analytical framework and simulation model are developed for evaluation of throughput distribution of the proposed schemes. An iterative approach is devised to handle the complex interdependency between multicell interference profiles in the throughput analysis. Illustrative results show significant throughput improvement offered by the interference-based assignment schemes for MC-CDMA multicell wireless systems. In particular, under low loading conditions, LIGA renders the best performance. However, as the load increases BCRGA tends to offer superior performance.

  13. Subcarrier Group Assignment for MC-CDMA Wireless Networks

    Directory of Open Access Journals (Sweden)

    Tho Le-Ngoc

    2007-12-01

    Full Text Available Two interference-based subcarrier group assignment strategies in dynamic resource allocation are proposed for MC-CDMA wireless systems to achieve high throughput in a multicell environment. Least interfered group assignment (LIGA selects for each session the subcarrier group on which the user receives the minimum interference, while best channel ratio group assignment (BCRGA chooses the subcarrier group with the largest channel response-to-interference ratio. Both analytical framework and simulation model are developed for evaluation of throughput distribution of the proposed schemes. An iterative approach is devised to handle the complex interdependency between multicell interference profiles in the throughput analysis. Illustrative results show significant throughput improvement offered by the interference-based assignment schemes for MC-CDMA multicell wireless systems. In particular, under low loading conditions, LIGA renders the best performance. However, as the load increases BCRGA tends to offer superior performance.

  14. Nonlinearity effect of electro-optical modulator response in double spread CDMA radio-over-fiber transmissions

    Science.gov (United States)

    Huang, Jen-Fa; Yen, Chih-Ta; Li, Tzung-Yen

    2008-07-01

    This study presents a double-spread code-division multiple-access (CDMA) scheme for radio-over-fiber (RoF) transmissions. The network coder/decoders (codecs) are implemented using arrayed-waveguide grating (AWG) routers coded with maximal-length sequence ( M-sequence) codes. The effects of phase-induced intensity noise (PIIN) and multiple-access interference (MAI) on the system performance are evaluated numerically for different values of the optical modulation index (OMI) during the nonlinear electro-optical modulator (EOM) response. At low OMI optical device noise is dominant, but at high OMI nonlinear effect becomes significant. Numerical result shows that the system performance is highly sensitive to the OMI. Therefore, specifying an appropriate value of the OMI is essential in optimizing the system performance. The influence of the degree of polarization (DOP) in the system is also discussed. By employing the scrambler in front of the balanced photo-detector, the system performance can be enhanced. The high-performance, low-cost characteristics of the double-spread CDMA render the scheme an ideal solution for radio-CDMA wireless system cascaded with optical CDMA network.

  15. Coherent Code Tracking for Spatial Transmit Diversity DS-CDMA Systems

    Directory of Open Access Journals (Sweden)

    R. W. Stewart

    2005-09-01

    Full Text Available Spatial transmit diversity schemes are now well integrated into third-generation cellular mobile communication system specifications. When DS-CDMA-based technology is deployed in typical macro- and microcell environments, multipath diversity and spatial diversity may be exploited simultaneously by a 2D RAKE receiver. The work presented in this paper focuses on taking advantage of spatial transmit diversity in synchronising the 2D RAKE structure. We investigate the use of coherent and noncoherent techniques for tracking the timing parameters of each multipath component. It is shown that both noncoherent and coherent techniques benefit from transmit diversity. Additionally the performance gap between these two techniques increases with the number of antennas.

  16. DS-CDMA satellite diversity reception for personal satellite communication: Downlink performance analysis

    Science.gov (United States)

    DeGaudenzi, Riccardo; Giannetti, Filippo

    1995-01-01

    The downlink of a satellite-mobile personal communication system employing power-controlled Direct Sequence Code Division Multiple Access (DS-CDMA) and exploiting satellite-diversity is analyzed and its performance compared with a more traditional communication system utilizing single satellite reception. The analytical model developed has been thoroughly validated by means of extensive Monte Carlo computer simulations. It is shown how the capacity gain provided by diversity reception shrinks considerably in the presence of increasing traffic or in the case of light shadowing conditions. Moreover, the quantitative results tend to indicate that to combat system capacity reduction due to intra-system interference, no more than two satellites shall be active over the same region. To achieve higher system capacity, differently from terrestrial cellular systems, Multi-User Detection (MUD) techniques are likely to be required in the mobile user terminal, thus considerably increasing its complexity.

  17. Experimental demonstration of all-optical CDMA using bipolar codes

    Science.gov (United States)

    Dennis, Tasshi

    1999-10-01

    Fiber optic networks capable of supporting a large pool of subscribers, many simultaneous users, and high data rates are receiving heightened interest as solutions to a growing communications need. The experiments reported in this study constitute the first experimental demonstration of a novel bipolar equivalent code-division multiple-access (CDMA) scheme. The sophisticated encoding increases noise tolerance, provides user security, and enables network flexibility. The scheme is based on an established bipolar radio frequency (RF) technique adapted to the unipolar optical domain. Whereas the phase of an RF signal can be readily detected, the high carrier frequency ( ~ 200 THz at 1.5 μm) of an optical wave necessitates that optical signals be detected and processed solely by intensity. Asynchronous operation makes the CDMA scheme data rate independent, while all-optical implementation avoids the bandwidth limitations imposed by electrical processing. A proof-of-principle experiment was conducted by spectrally encoding an erbium-doped superfluorescent fiber source (SFS) using a diffraction grating and an amplitude mask. The optical properties of the system were measured and the bipolar correlation of codes was verified. The practical implementation of the scheme was investigated by the design, construction, and operation of a fiber-based testbed. Correlation measurements performed with modulated signals confirmed that the scheme can recover a binary information symbol while rejecting multiple access interference. A theoretical analysis of the optical correlation process was conducted, which identified key optical parameters important to future implementations. The theory of excess noise associated with the photodetection of a thermal source was considered, followed by noise measurements of a light bulb and the erbium-doped SFS used for spectral encoding. Finally, the ability of the proposed scheme to effectively transmit data was investigated. Signal-to- noise

  18. Reverse Link CDMA System Capacity Evaluation for Stratospheric Platform Mobile Communications

    Directory of Open Access Journals (Sweden)

    Iskandar Iskandar

    2010-10-01

    Full Text Available We propose an analysis of reverse link CDMA multispot beam stratospheric platforms (SPF in this paper. The SPF is currently proposed as a novel wireless technology for the development of the next generation fixed and mobile communications. The geometry of this technology is different from that of the terrestrial but rather similar to the satellite based cellular system. However, evaluation on the CDMA system capacity of this technology has not been much reported. This paper addresses all possible multiple access interference analyses including the effects of channel fading and shadowing in order to evaluate the system capacity. Single SPF and multiple SPF model are evaluated under perfect power control and imperfect power control. The results indicate that in SPF systems the reverse link CDMA capacity is significantly reduced because of the power control imperfections. Moreover, in multiple SPF model the interference caused by the users in overlapped region is not trivial. We found that because of this problem the capacity is reduced for both speech and real-time data applications compared with the single SPF model even though the assumption of perfect power control can be made. In order to improve the system capacity we proposed two methods, first is to increase the minimum elevation angle definition for each platform and the second is to employ an adaptive antenna.

  19. A unifying paradigm for IS-95 CDMA system

    Energy Technology Data Exchange (ETDEWEB)

    Lee, K.R.; Kim, H.J.; Kim, W.K. [Korea University, Seoul (Korea, Republic of)

    1997-05-01

    An important method of generating binary sequences is by means of a shift register (SR) configuration such as Linear Feedback Shift Register (LFSR). The SR configuration is used for CRC, interleaver, convolutional encoder and PN generators in IS-95 CDMA system. In this regard, CRC, interleaver, convolutional encoder can be seen as input-driven configurations, and PN generator can be seen as an autonomous configuration. In this paper we propose some alternative schemes of PN code generator which has the different structure from conventional one. The implementations can be used toward building a single chip that handles most of the signal processing that occur at the front-end of IS-95 CDMA transmission. (author). 5 refs., 5 figs.

  20. CDMA à séquence directe appliqué aux systèmes de communications optiques

    OpenAIRE

    Lourdiane , Mounia

    2005-01-01

    Depuis quelques années, le besoin de systèmes de communications plus rapides et plus sures se fait sentir. Le partage entre utilisateurs de la très grande bande passante des fibres optiques nécessite des techniques d'accès adaptées. Afin de répondre à ces besoins, un certain nombre de techniques de multiplexage, dont le CDMA, ont été développées. Cette technique d'accès multiple est déjà largement utilisée dans les systèmes de communications radio-mobiles, que ce soit dans les normes américai...

  1. Fast converging minimum probability of error neural network receivers for DS-CDMA communications.

    Science.gov (United States)

    Matyjas, John D; Psaromiligkos, Ioannis N; Batalama, Stella N; Medley, Michael J

    2004-03-01

    We consider a multilayer perceptron neural network (NN) receiver architecture for the recovery of the information bits of a direct-sequence code-division-multiple-access (DS-CDMA) user. We develop a fast converging adaptive training algorithm that minimizes the bit-error rate (BER) at the output of the receiver. The adaptive algorithm has three key features: i) it incorporates the BER, i.e., the ultimate performance evaluation measure, directly into the learning process, ii) it utilizes constraints that are derived from the properties of the optimum single-user decision boundary for additive white Gaussian noise (AWGN) multiple-access channels, and iii) it embeds importance sampling (IS) principles directly into the receiver optimization process. Simulation studies illustrate the BER performance of the proposed scheme.

  2. On Analyzing LDPC Codes over Multiantenna MC-CDMA System

    Directory of Open Access Journals (Sweden)

    S. Suresh Kumar

    2014-01-01

    Full Text Available Multiantenna multicarrier code-division multiple access (MC-CDMA technique has been attracting much attention for designing future broadband wireless systems. In addition, low-density parity-check (LDPC code, a promising near-optimal error correction code, is also being widely considered in next generation communication systems. In this paper, we propose a simple method to construct a regular quasicyclic low-density parity-check (QC-LDPC code to improve the transmission performance over the precoded MC-CDMA system with limited feedback. Simulation results show that the coding gain of the proposed QC-LDPC codes is larger than that of the Reed-Solomon codes, and the performance of the multiantenna MC-CDMA system can be greatly improved by these QC-LDPC codes when the data rate is high.

  3. The research of atmospheric 2D optical PPM CDMA system with turbo coding

    Science.gov (United States)

    Zhou, Xiuli; Li, Zaoxia

    2007-11-01

    The atmospheric two-dimensional optical code-division multiple-access (CDMA) systems using pulse-position modulation (PPM) and Turbo-coded were presented. We analyzed the bit-error rate (BER) of the proposed system using pulse-position modulation (PPM) with considering the effects of the scintillation, avalanche photodiode noise, thermal noise, and multi-user interference. We showed that the atmospheric two dimensional (2D) optical PPM CDMA systems can realize high-speed communications when the logarithm variance of the scintillation is less than 0.1, and the turbo-coded atmospheric optical CDMA system has better bit error rate(BER) performance than the atmospheric optical PPM CDMA systems without turbo-coded. We also showed that the turbo-coded system has better performance than the multi-user detection system.

  4. Coding Across Multicodes and Time in CDMA Systems Employing MMSE Multiuser Detector

    Directory of Open Access Journals (Sweden)

    Park Jeongsoon

    2004-01-01

    Full Text Available When combining a multicode CDMA system with convolutional coding, two methods have been considered in the literature. In one method, coding is across time in each multicode channel while in the other the coding is across both multicodes and time. In this paper, a performance/complexity analysis of decoding metrics and trellis structures for the two schemes is carried out. It is shown that the latter scheme can exploit the multicode diversity inherent in convolutionally coded direct sequence code division multiple access (DS-CDMA systems which employ minimum mean squared error (MMSE multiuser detectors. In particular, when the MMSE detector provides sufficiently different signal-to-interference ratios (SIRs for the multicode channels, coding across multicodes and time can obtain significant performance gain over coding across time, with nearly the same decoding complexity.

  5. Variable-length code construction for incoherent optical CDMA systems

    Science.gov (United States)

    Lin, Jen-Yung; Jhou, Jhih-Syue; Wen, Jyh-Horng

    2007-04-01

    The purpose of this study is to investigate the multirate transmission in fiber-optic code-division multiple-access (CDMA) networks. In this article, we propose a variable-length code construction for any existing optical orthogonal code to implement a multirate optical CDMA system (called as the multirate code system). For comparison, a multirate system where the lower-rate user sends each symbol twice is implemented and is called as the repeat code system. The repetition as an error-detection code in an ARQ scheme in the repeat code system is also investigated. Moreover, a parallel approach for the optical CDMA systems, which is proposed by Marić et al., is also compared with other systems proposed in this study. Theoretical analysis shows that the bit error probability of the proposed multirate code system is smaller than other systems, especially when the number of lower-rate users is large. Moreover, if there is at least one lower-rate user in the system, the multirate code system accommodates more users than other systems when the error probability of system is set below 10 -9.

  6. A performance analysis of DS-CDMA and SCPC VSAT networks

    Science.gov (United States)

    Hayes, David P.; Ha, Tri T.

    1990-01-01

    Spread-spectrum and single-channel-per-carrier (SCPC) transmission techniques work well in very small aperture terminal (VSAT) networks for multiple-access purposes while allowing the earth station antennas to remain small. Direct-sequence code-division multiple-access (DS-CDMA) is the simplest spread-spectrum technique to use in a VSAT network since a frequency synthesizer is not required for each terminal. An examination is made of the DS-CDMA and SCPC Ku-band VSAT satellite systems for low-density (64-kb/s or less) communications. A method for improving the standardf link analysis of DS-CDMA satellite-switched networks by including certain losses is developed. The performance of 50-channel full mesh and star network architectures is analyzed. The selection of operating conditions producing optimum performance is demonstrated.

  7. Equivalence of Linear MMSE Detection in DS-CDMA and MC-CDMA Systems over Time and Frequency Selective Channels

    Directory of Open Access Journals (Sweden)

    Tamer A. Kadous

    2003-01-01

    Full Text Available The goal of this paper is to compare the performance of the linear minimum mean square error (MMSE detector for a class of code division multiple access (CDMA systems in time and frequency selective channels. Specifically, we consider direct sequence (DS-CDMA, multicarrier (MC-CDMA, and the MC-DS-CDMA systems. Two key tools are used in our development. First, a general time-frequency framework that includes the different CDMA systems as special cases. Second, the duality between time and frequency domains that is used to derive equivalences between the different CDMA systems operating over purely frequency selective and purely time selective channels. We then combine the insights obtained from these special cases to assess the performance of CDMA systems over time and frequency selective channels. We provide sufficient conditions for the codes employed by the CDMA systems for the equivalences to hold. Numerical results are presented to illustrate the results.

  8. Uplink Packet-Data Scheduling in DS-CDMA Systems

    Science.gov (United States)

    Choi, Young Woo; Kim, Seong-Lyun

    In this letter, we consider the uplink packet scheduling for non-real-time data users in a DS-CDMA system. As an effort to jointly optimize throughput and fairness, we formulate a time-span minimization problem incorporating the time-multiplexing of different simultaneous transmission schemes. Based on simple rules, we propose efficient scheduling algorithms and compare them with the optimal solution obtained by linear programming.

  9. An efficient CDMA decoder for correlated information sources

    International Nuclear Information System (INIS)

    Efraim, Hadar; Yacov, Nadav; Kanter, Ido; Shental, Ori

    2009-01-01

    We consider the detection of correlated information sources in the ubiquitous code-division multiple-access (CDMA) scheme. We propose a message-passing based scheme for detecting correlated sources directly, with no need for source coding. The detection is done simultaneously over a block of transmitted binary symbols (word). Simulation results are provided, demonstrating a substantial improvement in bit error rate in comparison with the unmodified detector and the alternative of source compression. The robustness of the error-performance improvement is shown under practical model settings, including wrong estimation of the generating Markov transition matrix and finite-length spreading codes

  10. Comparison of equalisation strategies for multi-carrier CDMA

    OpenAIRE

    Cooper, MA; Armour, SMD; Bian, YQ; McGeehan, JP

    2003-01-01

    This paper focuses on the bit error rate (BER) performance of equalisation strategies for a downlink MC-CDMA based system. Simulation results utilising maximal ratio combining (MRC), orthogonal restoring combining (ORC), equal gain combining (EGC) and minimum mean square error combining (MMSEC) for a multiuser scenario are presented. In addition, we analyse the relative complexities of each scheme and discuss their suitability for implementation in future consumer products

  11. Low Complexity Iterative Joint Channel Estimation and Multiuser Detection for DS-CDMA

    DEFF Research Database (Denmark)

    Christensen, Søren Skovgård; Kocian, Alexander; Fleury, Bernard Henri

    2004-01-01

    Previously the SAGE algorithm was applied to sub-optimal yet efficient Joint data Detection and channel Estimation (JDE) for DS-CDMA of moderate time complexity. Modifying the expectation and maximization steps of the SAGE-JDE scheme, it is possible to obtain an efficient receiver architecture...

  12. Comparison and classification of all-optical CDMA systems for future telecommunication networks

    Science.gov (United States)

    Iversen, Kay; Hampicke, Dirk

    1995-12-01

    This paper shows the state of the art in fiber optical code-division multiple-access (CDMA). Recent work in this area for both, systems and sequences is reviewed and analyzed. For that purpose a classification of systems, corresponding to the manner of signal processing and a classification of known (0,1)-sequences are presented. It is shown that due to the limits by currently available device technology especially two techniques are promising for implementation in broadband telecommunication networks: spectral encoding with integrated optical filters and CDMA in combination with wavelength multiple access schemes. Further an overview about some important experiments in this field is given.

  13. The Effects of Spatial Diversity and Imperfect Channel Estimation on Wideband MC-DS-CDMA and MC-CDMA

    Science.gov (United States)

    2009-10-01

    In our previous work, we compared the theoretical bit error rates of multi-carrier direct sequence code division multiple access (MC- DS - CDMA ) and...consider only those cases where MC- CDMA has higher frequency diversity than MC- DS - CDMA . Since increases in diversity yield diminishing gains, we conclude

  14. Time of Arrival Estimation in Probability-Controlled Generalized CDMA Systems

    Directory of Open Access Journals (Sweden)

    Hagit Messer

    2007-11-01

    Full Text Available In recent years, more and more wireless communications systems are required to provide also a positioning measurement. In code division multiple access (CDMA communication systems, the positioning accuracy is significantly degraded by the multiple access interference (MAI caused by other users in the system. This MAI is commonly managed by a power control mechanism, and yet, MAI has a major effect on positioning accuracy. Probability control is a recently introduced interference management mechanism. In this mechanism, a user with excess power chooses not to transmit some of its symbols. The information in the nontransmitted symbols is recovered by an error-correcting code (ECC, while all other users receive a more reliable data during these quiet periods. Previous research had shown that the implementation of a probability control mechanism can significantly reduce the MAI. In this paper, we show that probability control also improves the positioning accuracy. We focus on time-of-arrival (TOA based positioning systems. We analyze the TOA estimation performance in a generalized CDMA system, in which the probability control mechanism is employed, where the transmitted signal is noncontinuous with a symbol transmission probability smaller than 1. The accuracy of the TOA estimation is determined using appropriate modifications of the Cramer-Rao bound on the delay estimation. Keeping the average transmission power constant, we show that the TOA accuracy of each user does not depend on its transmission probability, while being a nondecreasing function of the transmission probability of any other user. Therefore, a generalized, noncontinuous CDMA system with a probability control mechanism can always achieve better positioning performance, for all users in the network, than a conventional, continuous, CDMA system.

  15. Generalized Multicarrier CDMA: Unification and Linear Equalization

    Directory of Open Access Journals (Sweden)

    Wang Zhengdao

    2005-01-01

    Full Text Available Relying on block-symbol spreading and judicious design of user codes, this paper builds on the generalized multicarrier (GMC quasisynchronous CDMA system that is capable of multiuser interference (MUI elimination and intersymbol interference (ISI suppression with guaranteed symbol recovery, regardless of the wireless frequency-selective channels. GMC-CDMA affords an all-digital unifying framework, which encompasses single-carrier and several multicarrier (MC CDMA systems. Besides the unifying framework, it is shown that GMC-CDMA offers flexibility both in full load (maximum number of users allowed by the available bandwidth and in reduced load settings. A novel blind channel estimation algorithm is also derived. Analytical evaluation and simulations illustrate the superior error performance and flexibility of uncoded GMC-CDMA over competing MC-CDMA alternatives especially in the presence of uplink multipath channels.

  16. Subband Adaptive Array for DS-CDMA Mobile Radio

    Directory of Open Access Journals (Sweden)

    Tran Xuan Nam

    2004-01-01

    Full Text Available We propose a novel scheme of subband adaptive array (SBAA for direct-sequence code division multiple access (DS-CDMA. The scheme exploits the spreading code and pilot signal as the reference signal to estimate the propagation channel. Moreover, instead of combining the array outputs at each output tap using a synthesis filter and then despreading them, we despread directly the array outputs at each output tap by the desired user's code to save the synthesis filter. Although its configuration is far different from that of 2D RAKEs, the proposed scheme exhibits relatively equivalent performance of 2D RAKEs while having less computation load due to utilising adaptive signal processing in subbands. Simulation programs are carried out to explore the performance of the scheme and compare its performance with that of the standard 2D RAKE.

  17. Uniform Circular Antenna Array Applications in Coded DS-CDMA Mobile Communication Systems

    National Research Council Canada - National Science Library

    Seow, Tian

    2003-01-01

    ...) has greatly increased. This thesis examines the use of an equally spaced circular adaptive antenna array at the mobile station for a typical coded direct sequence code division multiple access (DS-CDMA...

  18. High-Performance Wireless via the Merger of CI Chip-Shaped DS-CDMA and Oscillating-Beam Smart Antenna Arrays

    Directory of Open Access Journals (Sweden)

    Nassar Carl R

    2004-01-01

    Full Text Available We introduce a novel merger of direct sequence code division multiple access (DS-CDMA and smart antenna arrays. With regard to the DS-CDMA scheme, we employ carrier interferometry DS-CDMA (CI/DS-CDMA, a novel implementation of DS-CDMA where chips are decomposable into narrowband frequency components. With regard to the antenna array, we deploy the oscillating-beam smart array. Here, applying proper time-varying phases to the array elements, we create small movement (oscillation in the antenna array's pattern, while steering the antenna pattern main lobe to the position of the intended user. The oscillating antenna pattern creates a time-varying channel with a controllable coherence time. This, in turn, provides transmit diversity in the form of a time diversity gain at the mobile receiver side. At the receiver, three stages of combining are available: combining time components of the received signal within symbol duration (each experiencing a different fade to enhance performance via time diversity; combining frequency components which make up the CI/DS-CDMA chip to enhance the performance via frequency diversity; and combining across chips to eliminate the interfering users on the system. Merging CI/DS-CDMA with the oscillating-beam smart antenna at the base station, we achieve very high capacity via the merger of SDMA (available through directionality of the antenna array and code division multiple access (inherent in CI/DS-CDMA, and very high performance via the construction of receivers that exploit both transmit diversity and frequency diversity. We present the performance gains of the proposed merger.

  19. An Iterative Multiuser Detector for Turbo-Coded DS-CDMA Systems

    Directory of Open Access Journals (Sweden)

    Takawira Fambirai

    2005-01-01

    Full Text Available We propose an iterative multiuser detector for turbo-coded synchronous and asynchronous direct-sequence CDMA (DS-CDMA systems. The receiver is derived from the maximum a posteriori (MAP estimation of the single user's transmitted data, conditioned on information about the estimate of the multiple-access interference (MAI and the received signal from the channel. This multiple-access interference is reconstructed by making hard decisions on the users' detected bits at the preceding iteration. The complexity of the proposed receiver increases linearly with the number of users. The proposed detection scheme is compared with a previously developed one. The multiuser detector proposed in this paper has a better performance when the transmitted powers of all active users are equal in the additive white Gaussian noise (AWGN channel. Also, the detector is found to be resilient against the near-far effect.

  20. A mean field theory of coded CDMA systems

    International Nuclear Information System (INIS)

    Yano, Toru; Tanaka, Toshiyuki; Saad, David

    2008-01-01

    We present a mean field theory of code-division multiple-access (CDMA) systems with error-control coding. On the basis of the relation between the free energy and mutual information, we obtain an analytical expression of the maximum spectral efficiency of the coded CDMA system, from which a mean-field description of the coded CDMA system is provided in terms of a bank of scalar Gaussian channels whose variances in general vary at different code symbol positions. Regular low-density parity-check (LDPC)-coded CDMA systems are also discussed as an example of the coded CDMA systems

  1. A mean field theory of coded CDMA systems

    Energy Technology Data Exchange (ETDEWEB)

    Yano, Toru [Graduate School of Science and Technology, Keio University, Hiyoshi, Kohoku-ku, Yokohama-shi, Kanagawa 223-8522 (Japan); Tanaka, Toshiyuki [Graduate School of Informatics, Kyoto University, Yoshida Hon-machi, Sakyo-ku, Kyoto-shi, Kyoto 606-8501 (Japan); Saad, David [Neural Computing Research Group, Aston University, Birmingham B4 7ET (United Kingdom)], E-mail: yano@thx.appi.keio.ac.jp

    2008-08-15

    We present a mean field theory of code-division multiple-access (CDMA) systems with error-control coding. On the basis of the relation between the free energy and mutual information, we obtain an analytical expression of the maximum spectral efficiency of the coded CDMA system, from which a mean-field description of the coded CDMA system is provided in terms of a bank of scalar Gaussian channels whose variances in general vary at different code symbol positions. Regular low-density parity-check (LDPC)-coded CDMA systems are also discussed as an example of the coded CDMA systems.

  2. Sharing possibilities amongst CDMA Mobile Satellite Systems, and impacts of terminal characteristics on sharing

    Science.gov (United States)

    Bambace, Luís Antonio Waack; Ceballos, Décio Castilho

    CDMA Mobile Satellite Systems (CDMA MSS) are able to co-directional, co-frequency and co-coverage sharing, and they are strongly interdependent in case of such a sharing. It is also known that the success of any telecommunication project is the use of the correct media to each task. Operators have a clear sight of such a media adequacy in traditional systems, but not necessarily in the case of Mobile Satellite Systems. This creates a risk that a wrong market objective operator causes trouble to other systems. This paper deals with the sharing alternatives for up to four CDMA MSS operating in the same frequency band, and analysts both: satellite to user downlink and user to satellite uplink. The influence of several items in capacity is here treated. The scope includes: downlink power flux density: code availability; single system internal interference; inter-system interference; diversity schemes: average link impairments, margins; user cooperation; terminal specifications and the dependence of the insulation between RHCP and LHCP with fade.

  3. Performance Evaluation of a Novel CDMA Detection Technique: The Two-State Approach

    Directory of Open Access Journals (Sweden)

    Luca Simone Ronga

    2005-04-01

    Full Text Available The use of code division multiple access (CDMA makes third-generation wireless systems interference limited rather than noise limited. The research for new methods to reduce interference and increase efficiency lead us to formulate a signaling method where fast impulsive silence states are mapped on zero-energy symbols. The theoretical formulation of the optimum receiver is reported and the asymptotic multiuser efficiency (AME as well as an upper bound of the probability of error have been derived and applied to the conventional receiver and the decorrelating detector. Moreover, computer simulations have been performed to show the advantages of the proposed two-state scheme over the traditional single-state receiver in a multiuser CDMA system operating in a multipath fading channel.

  4. Handoff Triggering and Network Selection Algorithms for Load-Balancing Handoff in CDMA-WLAN Integrated Networks

    Directory of Open Access Journals (Sweden)

    Khalid Qaraqe

    2008-10-01

    Full Text Available This paper proposes a novel vertical handoff algorithm between WLAN and CDMA networks to enable the integration of these networks. The proposed vertical handoff algorithm assumes a handoff decision process (handoff triggering and network selection. The handoff trigger is decided based on the received signal strength (RSS. To reduce the likelihood of unnecessary false handoffs, the distance criterion is also considered. As a network selection mechanism, based on the wireless channel assignment algorithm, this paper proposes a context-based network selection algorithm and the corresponding communication algorithms between WLAN and CDMA networks. This paper focuses on a handoff triggering criterion which uses both the RSS and distance information, and a network selection method which uses context information such as the dropping probability, blocking probability, GoS (grade of service, and number of handoff attempts. As a decision making criterion, the velocity threshold is determined to optimize the system performance. The optimal velocity threshold is adjusted to assign the available channels to the mobile stations. The optimal velocity threshold is adjusted to assign the available channels to the mobile stations using four handoff strategies. The four handoff strategies are evaluated and compared with each other in terms of GOS. Finally, the proposed scheme is validated by computer simulations.

  5. Handoff Triggering and Network Selection Algorithms for Load-Balancing Handoff in CDMA-WLAN Integrated Networks

    Directory of Open Access Journals (Sweden)

    Kim Jang-Sub

    2008-01-01

    Full Text Available This paper proposes a novel vertical handoff algorithm between WLAN and CDMA networks to enable the integration of these networks. The proposed vertical handoff algorithm assumes a handoff decision process (handoff triggering and network selection. The handoff trigger is decided based on the received signal strength (RSS. To reduce the likelihood of unnecessary false handoffs, the distance criterion is also considered. As a network selection mechanism, based on the wireless channel assignment algorithm, this paper proposes a context-based network selection algorithm and the corresponding communication algorithms between WLAN and CDMA networks. This paper focuses on a handoff triggering criterion which uses both the RSS and distance information, and a network selection method which uses context information such as the dropping probability, blocking probability, GoS (grade of service, and number of handoff attempts. As a decision making criterion, the velocity threshold is determined to optimize the system performance. The optimal velocity threshold is adjusted to assign the available channels to the mobile stations. The optimal velocity threshold is adjusted to assign the available channels to the mobile stations using four handoff strategies. The four handoff strategies are evaluated and compared with each other in terms of GOS. Finally, the proposed scheme is validated by computer simulations.

  6. Intersystem Interference Reduction for Overlaid HAPS-Terrestrial CDMA System

    Science.gov (United States)

    Huang, Jeng-Ji; Wang, Wei-Ting; Li, Mingfu; Shiung, David; Ferng, Huei-Wen

    In this letter, we propose that directional antennas, combined with power management, be incorporated to reduce intersystem interference in a shared band overlaid high altitude platform station (HAPS)-terrestrial code division multiple access (CDMA) system. To eliminate the HAPS to terrestrial interference, the HAPS is accessed only via directional antennas under the proposed scheme. By doing so, the uplink power to the HAPS can accordingly be increased, so that the terrestrial to HAPS interference is also effectively suppressed.

  7. Coding-Spreading Tradeoff in CDMA Systems

    National Research Council Canada - National Science Library

    Bolas, Eduardo

    2002-01-01

    .... Comparing different combinations of coding and spreading with a traditional DS-CDMA, as defined in the IS-95 standard, allows the criteria to be defined for the best coding-spreading tradeoff in CDMA systems...

  8. Multicarrier Spread Spectrum Modulation Schemes and Efficient FFT Algorithms for Cognitive Radio Systems

    Directory of Open Access Journals (Sweden)

    Mohandass Sundararajan

    2014-07-01

    Full Text Available Spread spectrum (SS and multicarrier modulation (MCM techniques are recognized as potential candidates for the design of underlay and interweave cognitive radio (CR systems, respectively. Direct Sequence Code Division Multiple Access (DS-CDMA is a spread spectrum technique generally used in underlay CR systems. Orthogonal Frequency Division Multiplexing (OFDM is the basic MCM technique, primarily used in interweave CR systems. There are other MCM schemes derived from OFDM technique, like Non-Contiguous OFDM, Spread OFDM, and OFDM-OQAM, which are more suitable for CR systems. Multicarrier Spread Spectrum Modulation (MCSSM schemes like MC-CDMA, MC-DS-CDMA and SS-MC-CDMA, combine DS-CDMA and OFDM techniques in order to improve the CR system performance and adaptability. This article gives a detailed survey of the various spread spectrum and multicarrier modulation schemes proposed in the literature. Fast Fourier Transform (FFT plays a vital role in all the multicarrier modulation techniques. The FFT part of the modem can be used for spectrum sensing. The performance of the FFT operator plays a crucial role in the overall performance of the system. Since the cognitive radio is an adaptive system, the FFT operator must also be adaptive for various input/output values, in order to save energy and time taken for execution. This article also includes the various efficient FFT algorithms proposed in the literature, which are suitable for CR systems.

  9. OFDM and MC-CDMA for broadband multi-user communications WLANs and broadcasting

    CERN Document Server

    2003-01-01

    "OFDM systems have experienced increased attention in recent years and have found applications in a number of diverse areas including telephone-line based ADSL links, digital audio and video broadcasting systems, and wireless local area networks. OFDM is being considered for the next-generation of wireless systems both with and without direct sequence spreading and the resultant spreading-based multi-carrier CDMA systems have numerous attractive properties. This volume provides the reader with a broad overview of the research on OFDM systems during their 40-year history. Part I commences with an easy to read conceptual, rather than mathematical, treatment of the basic design issues of OFDM systems. The discussions gradually deepen to include adaptive single and multi-user OFDM systems invoking adaptive turbo coding. Part II introduces the taxonomy of multi-carrier CDMA systems and deals with the design of their spreading codes and the objective of minimising their crest factors. This part also compares the be...

  10. Flexible Transmission Scheme for 4G Wireless Systems with Multiple Antennas

    Directory of Open Access Journals (Sweden)

    Horlin François

    2005-01-01

    Full Text Available New air interfaces are currently being developed to meet the high requirements of the emerging wireless communication systems. In this context, the combinations of the multicarrier (MC and spread-spectrum (SS technologies are promising candidates. In this paper, we propose a generic transmission scheme that allows to instantiate all the combinations of orthogonal frequency-division multiplexing (OFDM and cyclic-prefixed single-carrier (SC modulations with direct-sequence code-division multiple access (DS-CDMA. The generic transmission scheme is extended to integrate the space-division multiplexing (SDM and the orthogonal space-time block coding (STBC. Based on a generalized matrix model, the linear frequency-domain minimum mean square error (MMSE joint detector is derived. A mode selection strategy for up- and downlink is advised that efficiently trades off the cost of the mobile terminal and the achieved performance of a high-mobility cellular system. It is demonstrated that an adaptive transceiver that supports the proposed communication modes is necessary to track the changing communication conditions.

  11. Quantum Communication Scheme Using Non-symmetric Quantum Channel

    International Nuclear Information System (INIS)

    Cao Haijing; Chen Zhonghua; Song Heshan

    2008-01-01

    A theoretical quantum communication scheme based on entanglement swapping and superdense coding is proposed with a 3-dimensional Bell state and 2-dimensional Bell state function as quantum channel. quantum key distribution and quantum secure direct communication can be simultaneously accomplished in the scheme. The scheme is secure and has high source capacity. At last, we generalize the quantum communication scheme to d-dimensional quantum channel

  12. Single integrated device for optical CDMA code processing in dual-code environment.

    Science.gov (United States)

    Huang, Yue-Kai; Glesk, Ivan; Greiner, Christoph M; Iazkov, Dmitri; Mossberg, Thomas W; Wang, Ting; Prucnal, Paul R

    2007-06-11

    We report on the design, fabrication and performance of a matching integrated optical CDMA encoder-decoder pair based on holographic Bragg reflector technology. Simultaneous encoding/decoding operation of two multiple wavelength-hopping time-spreading codes was successfully demonstrated and shown to support two error-free OCDMA links at OC-24. A double-pass scheme was employed in the devices to enable the use of longer code length.

  13. Handover aspects for a Low Earth Orbit (LEO) CDMA Land Mobile Satellite (LMS) system

    Science.gov (United States)

    Carter, P.; Beach, M. A.

    1993-01-01

    This paper addresses the problem of handoff in a land mobile satellite (LMS) system between adjacent satellites in a low earth orbit (LEO) constellation. In particular, emphasis is placed on the application of soft handoff in a direct sequence code division multiple access (DS-CDMA) LMS system. Soft handoff is explained in terms of terrestrial macroscopic diversity, in which signals transmitted via several independent fading paths are combined to enhance the link quality. This concept is then reconsidered in the context of a LEO LMS system. A two-state Markov channel model is used to simulate the effects of shadowing on the communications path from the mobile to each satellite during handoff. The results of the channel simulation form a platform for discussion regarding soft handoff, highlighting the potential merits of the scheme when applied in a LEO LMS environment.

  14. Quantum Secure Communication Scheme with W State

    International Nuclear Information System (INIS)

    Wang Jian; Zhang Quan; Tang Chaojng

    2007-01-01

    We present a quantum secure communication scheme using three-qubit W state. It is unnecessary for the present scheme to use alternative measurement or Bell basis measurement. Compared with the quantum secure direct communication scheme proposed by Cao et al. [H.J. Cao and H.S. Song, Chin. Phys. Lett. 23 (2006) 290], in our scheme, the detection probability for an eavesdropper's attack increases from 8.3% to 25%. We also show that our scheme is secure for a noise quantum channel.

  15. On Intercell Interference and Its Cancellation in Cellular Multicarrier CDMA Systems

    Directory of Open Access Journals (Sweden)

    Plass Simon

    2008-01-01

    Full Text Available Abstract The handling of intercell interference at the cell border area is a strong demand in future communication systems to guarantee efficient use of the available bandwidth. Therefore, this paper focuses on the application of iterative intercell interference cancellation schemes in cellular multicarrier code division multiple access (MC-CDMA systems at the receiver side for the downlink. First, the influence of the interfering base stations to the total intercell interference is investigated. Then, different concepts for intercell interference cancellation are described and investigated for scenarios with several interfering cells. The first approach is based on the use of the hard decision of the demodulator to reconstruct the received signals. This does not require the higher amount of complexity compared to the second approach which is based on the use of the more reliable soft values from the decoding process. Furthermore, the extrinsic information as a reliability measure of this soft iterative cancellation process is investigated in more detail based on the geographical position of the mobile terminal. Both approaches show significant performance gains in the severe cell border area. With the soft intercell interference cancellation scheme, it is possible to reach the single-user bound. Therefore, the intercell interference can be almost eliminated.

  16. Orthogonal Multi-Carrier DS-CDMA with Frequency-Domain Equalization

    Science.gov (United States)

    Tanaka, Ken; Tomeba, Hiromichi; Adachi, Fumiyuki

    Orthogonal multi-carrier direct sequence code division multiple access (orthogonal MC DS-CDMA) is a combination of orthogonal frequency division multiplexing (OFDM) and time-domain spreading, while multi-carrier code division multiple access (MC-CDMA) is a combination of OFDM and frequency-domain spreading. In MC-CDMA, a good bit error rate (BER) performance can be achieved by using frequency-domain equalization (FDE), since the frequency diversity gain is obtained. On the other hand, the conventional orthogonal MC DS-CDMA fails to achieve any frequency diversity gain. In this paper, we propose a new orthogonal MC DS-CDMA that can obtain the frequency diversity gain by applying FDE. The conditional BER analysis is presented. The theoretical average BER performance in a frequency-selective Rayleigh fading channel is evaluated by the Monte-Carlo numerical computation method using the derived conditional BER and is confirmed by computer simulation of the orthogonal MC DS-CDMA signal transmission.

  17. RLS Channel Estimation with Adaptive Forgetting Factor for DS-CDMA Frequency-Domain Equalization

    Science.gov (United States)

    Kojima, Yohei; Tomeba, Hiromichi; Takeda, Kazuaki; Adachi, Fumiyuki

    Frequency-domain equalization (FDE) based on the minimum mean square error (MMSE) criterion can increase the downlink bit error rate (BER) performance of DS-CDMA beyond that possible with conventional rake combining in a frequency-selective fading channel. FDE requires accurate channel estimation. Recently, we proposed a pilot-assisted channel estimation (CE) based on the MMSE criterion. Using MMSE-CE, the channel estimation accuracy is almost insensitive to the pilot chip sequence, and a good BER performance is achieved. In this paper, we propose a channel estimation scheme using one-tap recursive least square (RLS) algorithm, where the forgetting factor is adapted to the changing channel condition by the least mean square (LMS)algorithm, for DS-CDMA with FDE. We evaluate the BER performance using RLS-CE with adaptive forgetting factor in a frequency-selective fast Rayleigh fading channel by computer simulation.

  18. Multiple Access Interference Reduction Using Received Response Code Sequence for DS-CDMA UWB System

    Science.gov (United States)

    Toh, Keat Beng; Tachikawa, Shin'ichi

    This paper proposes a combination of novel Received Response (RR) sequence at the transmitter and a Matched Filter-RAKE (MF-RAKE) combining scheme receiver system for the Direct Sequence-Code Division Multiple Access Ultra Wideband (DS-CDMA UWB) multipath channel model. This paper also demonstrates the effectiveness of the RR sequence in Multiple Access Interference (MAI) reduction for the DS-CDMA UWB system. It suggests that by using conventional binary code sequence such as the M sequence or the Gold sequence, there is a possibility of generating extra MAI in the UWB system. Therefore, it is quite difficult to collect the energy efficiently although the RAKE reception method is applied at the receiver. The main purpose of the proposed system is to overcome the performance degradation for UWB transmission due to the occurrence of MAI during multiple accessing in the DS-CDMA UWB system. The proposed system improves the system performance by improving the RAKE reception performance using the RR sequence which can reduce the MAI effect significantly. Simulation results verify that significant improvement can be obtained by the proposed system in the UWB multipath channel models.

  19. Quadrature amplitude modulation from basics to adaptive trellis-coded turbo-equalised and space-time coded OFDM CDMA and MC-CDMA systems

    CERN Document Server

    Hanzo, Lajos

    2004-01-01

    "Now fully revised and updated, with more than 300 pages of new material, this new edition presents the wide range of recent developments in the field and places particular emphasis on the family of coded modulation aided OFDM and CDMA schemes. In addition, it also includes a fully revised chapter on adaptive modulation and a new chapter characterizing the design trade-offs of adaptive modulation and space-time coding." "In summary, this volume amalgamates a comprehensive textbook with a deep research monograph on the topic of QAM, ensuring it has a wide-ranging appeal for both senior undergraduate and postgraduate students as well as practicing engineers and researchers."--Jacket.

  20. Theoretical analysis and simulation of a code division multiple access system (cdma for secure signal transmission in wideband channels

    Directory of Open Access Journals (Sweden)

    Stevan M. Berber

    2014-06-01

    Full Text Available Chaotic spreading sequences can increase secrecy and resistance to interception in signal transmission. Chaos-based CDMA systems have been well investigated in the case of flat fading and noise presence in the channel. However, these systems operating in wideband channels, characterized by the frequency selective fading and white Gaussian noise, have not been investigated to the level of understanding their practical applications. This paper presents a detailed mathematical model of a CDMA system based on chaotic spreading sequences. In a theoretical analysis, all signals are represented in the discrete time domain. Using the theory of discrete time stochastic processes, the probability of error expressions are derived in a closed form for a multi-user chaos based CDMA system. For the sake of comparison, the expressions for the probability of error are derived separately for narrowband and wideband channels. The application of the system interleaving technique is investigated in particular, which showed that this technique can substantially improve probability of error in the system.  The system is simulated and the findings of the simulation confirmed theoretically expected results. Possible improvements in the probability of bit error due to multipath channel nature, with and without interleavers, are quantified depending on the random delay and the number of users in the system. In the analyzed system, a simplified version of the wideband channel model, proposed for modern wideband wireless networks, is used. Introduction Over the past years, the demand for wireless communications has increased substantially due to advancements in mobile communication systems and networks. Following these increasing demands, modern communication systems require the ability to handle a large number of users to process and transmit wideband signals through complex frequency selective channels. One of the techniques for transmission of multi-user signals is the

  1. Design of power controller in CDMA system with power and SIR error minimization

    Institute of Scientific and Technical Information of China (English)

    Shulan KONG; Huanshui ZHANG; Zhaosheng ZHANG; Hongxia WANG

    2007-01-01

    In this paper, an uplink power control problem is considered for code division multiple access (CDMA) systems. A distributed algorithm is proposed based on linear quadratic optimal control theory. The proposed scheme minimizes the sum of the power and the error of signal-to-interference ratio (SIR). A power controller is designed by constructing an optimization problem of a stochastic linear quadratic type in Krein space and solving a Kalman filter problem.

  2. Asynchronous, Decentralized DS-CDMA Using Feedback-Controlled Spreading Sequences for Time-Dispersive Channels

    Science.gov (United States)

    Miyatake, Teruhiko; Chiba, Kazuki; Hamamura, Masanori; Tachikawa, Shin'ichi

    We propose a novel asynchronous direct-sequence codedivision multiple access (DS-CDMA) using feedback-controlled spreading sequences (FCSSs) (FCSS/DS-CDMA). At the receiver of FCSS/DS-CDMA, the code-orthogonalizing filter (COF) produces a spreading sequence, and the receiver returns the spreading sequence to the transmitter. Then the transmitter uses the spreading sequence as its updated version. The performance of FCSS/DS-CDMA is evaluated over time-dispersive channels. The results indicate that FCSS/DS-CDMA greatly suppresses both the intersymbol interference (ISI) and multiple access interference (MAI) over time-invariant channels. FCSS/DS-CDMA is applicable to the decentralized multiple access.

  3. Optical CDMA and WDMA in the access network

    Science.gov (United States)

    Sargent, Edward H.; Stok, Andrew

    2003-08-01

    Optical CDMA provides one avenue to sharing the vast bandwidth of optical fiber among a number of active users in a network. In this work we address two questions central to considering the areas of applicability of CDMA in optics: (1) How do we compare fairly optical CDMA codes of different families, and what do we conclude? (2) How do we compare optical CDMA performance with that of conventional optical WDMA? To answer the first question, we present a method of comparing optical CDMA codes of different families, sizes and weights. We outline why the traditional performance metric of bit-error rate versus number of simultaneous users is lacking and propose a different performance measure -- the peak throughput normalized with respect to the size of the code. This metric is used to show that optical-orthogonal codes (OOCs) with a weight of 4 perform best at low offered loads while OOCs with weight 5 should be used at higher offered loads. By applying the technique across different families of codes, we demonstrate that multi-wavelength OOCs (MWOOCs) perform better than both OOCs (by a factor of approximately 1.25) and asymmetric prime-hop codes (by a factor of approximately 3.5), over a wide range of offered loads. In answer to the second question, we present a comparison of the performance of optical code-division multiple-access (CDMA) systems with that of a wavelength-division multiple-access (WDMA) system. The multiple-access techniques are applied in a time-slotted broadcast local-area network. The utilization, defined as the throughput per unit of time-domain bandwidth expansion, and packet delay are used as metrics of performance. When more than seven wavelengths are available, optical CDMA systems using asymmetric prime-hop codes and all-optical signal processing are shown to have higher peak utilization and lower corresponding delay than a WDMA system with the same number of wavelengths. When the encoders/decoders operate at the chip rate, the utilization

  4. Effects of sparse sampling schemes on image quality in low-dose CT

    International Nuclear Information System (INIS)

    Abbas, Sajid; Lee, Taewon; Cho, Seungryong; Shin, Sukyoung; Lee, Rena

    2013-01-01

    Purpose: Various scanning methods and image reconstruction algorithms are actively investigated for low-dose computed tomography (CT) that can potentially reduce a health-risk related to radiation dose. Particularly, compressive-sensing (CS) based algorithms have been successfully developed for reconstructing images from sparsely sampled data. Although these algorithms have shown promises in low-dose CT, it has not been studied how sparse sampling schemes affect image quality in CS-based image reconstruction. In this work, the authors present several sparse-sampling schemes for low-dose CT, quantitatively analyze their data property, and compare effects of the sampling schemes on the image quality.Methods: Data properties of several sampling schemes are analyzed with respect to the CS-based image reconstruction using two measures: sampling density and data incoherence. The authors present five different sparse sampling schemes, and simulated those schemes to achieve a targeted dose reduction. Dose reduction factors of about 75% and 87.5%, compared to a conventional scan, were tested. A fully sampled circular cone-beam CT data set was used as a reference, and sparse sampling has been realized numerically based on the CBCT data.Results: It is found that both sampling density and data incoherence affect the image quality in the CS-based reconstruction. Among the sampling schemes the authors investigated, the sparse-view, many-view undersampling (MVUS)-fine, and MVUS-moving cases have shown promising results. These sampling schemes produced images with similar image quality compared to the reference image and their structure similarity index values were higher than 0.92 in the mouse head scan with 75% dose reduction.Conclusions: The authors found that in CS-based image reconstructions both sampling density and data incoherence affect the image quality, and suggest that a sampling scheme should be devised and optimized by use of these indicators. With this strategic

  5. Statistical Analysis of Coherent Ultrashort Light Pulse CDMA With Multiple Optical Amplifiers Using Additive Noise Model

    Science.gov (United States)

    Jamshidi, Kambiz; Salehi, Jawad A.

    2005-05-01

    This paper describes a study of the performance of various configurations for placing multiple optical amplifiers in a typical coherent ultrashort light pulse code-division multiple access (CULP-CDMA) communication system using the additive noise model. For this study, a comprehensive performance analysis was developed that takes into account multiple-access noise, noise due to optical amplifiers, and thermal noise using the saddle-point approximation technique. Prior to obtaining the overall system performance, the input/output statistical models for different elements of the system such as encoders/decoders,star coupler, and optical amplifiers were obtained. Performance comparisons between an ideal and lossless quantum-limited case and a typical CULP-CDMA with various losses exhibit more than 30 dB more power requirement to obtain the same bit-error rate (BER). Considering the saturation effect of optical amplifiers, this paper discusses an algorithm for amplifiers' gain setting in various stages of the network in order to overcome the nonlinear effects on signal modulation in optical amplifiers. Finally, using this algorithm,various configurations of multiple optical amplifiers in CULP-CDMA are discussed and the rules for the required optimum number of amplifiers are shown with their corresponding optimum locations to be implemented along the CULP-CDMA system.

  6. Iterative Soft Decision Interference Cancellation for DS-CDMA Employing the Distribution of Interference

    Directory of Open Access Journals (Sweden)

    Gerstacker WolfgangH

    2010-01-01

    Full Text Available A well-known receiver strategy for direct-sequence code-division multiple-access (DS-CDMA transmission is iterative soft decision interference cancellation. For calculation of soft estimates used for cancellation, the distribution of residual interference is commonly assumed to be Gaussian. In this paper, we analyze matched filter-based iterative soft decision interference cancellation (MF ISDIC when utilizing an approximation of the actual probability density function (pdf of residual interference. In addition, a hybrid scheme is proposed, which reduces computational complexity by considering the strongest residual interferers according to their pdf while the Gaussian assumption is applied to the weak residual interferers. It turns out that the bit error ratio decreases already noticeably when only a small number of residual interferers is regarded according to their pdf. For the considered DS-CDMA transmission the bit error ratio decreases by 80% for high signal-to-noise ratios when modeling all residual interferers but the strongest three to be Gaussian distributed.

  7. Design and simulations of a spectral efficient optical code division multiple access scheme using alternated energy differentiation and single-user soft-decision demodulation

    Science.gov (United States)

    A. Garba, Aminata

    2017-01-01

    This paper presents a new approach to optical Code Division Multiple Access (CDMA) network transmission scheme using alternated amplitude sequences and energy differentiation at the transmitters to allow concurrent and secure transmission of several signals. The proposed system uses error control encoding and soft-decision demodulation to reduce the multi-user interference at the receivers. The design of the proposed alternated amplitude sequences, the OCDMA energy modulators and the soft decision, single-user demodulators are also presented. Simulation results show that the proposed scheme allows achieving spectral efficiencies higher than several reported results for optical CDMA and much higher than the Gaussian CDMA capacity limit.

  8. HOT SPOT RELIEF WITH EMBEDDED BEAM FOR CDMA SYSTEMS IN HAPS

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    This paper proposes a novel micro/macro beam coverage scheme used in High Altitude Platform System (HAPS) Code Division Multiple Access (CDMA) systems. A relief of traffic burden in hot spot areas is achieved by embedding micro-beams into the macro-beams at the hot spot locations, together with appropriate power ratio control and user ratio control. The simulation results show that the hot spot problem can be relieved efficiently with the presented configuration, and a higher and more stable system capacity is expectable despite the variation of user distribution.

  9. Optimal resource allocation in downlink CDMA wireless networks

    NARCIS (Netherlands)

    Endrayanto, A.I.

    2013-01-01

    This thesis presents a full analytical characterization of the optimal joint downlink rate and power assignment for maximal total system throughput in a multi cell CDMA network. In Chapter 2, we analyze the feasibility of downlink power assignment in a linear model of two CDMA cell, under the

  10. A MUSIC-Based Algorithm for Blind User Identification in Multiuser DS-CDMA

    Directory of Open Access Journals (Sweden)

    M. Reza Soleymani

    2005-04-01

    Full Text Available A blind scheme based on multiple-signal classification (MUSIC algorithm for user identification in a synchronous multiuser code-division multiple-access (CDMA system is suggested. The scheme is blind in the sense that it does not require prior knowledge of the spreading codes. Spreading codes and users' power are acquired by the scheme. Eigenvalue decomposition (EVD is performed on the received signal, and then all the valid possible signature sequences are projected onto the subspaces. However, as a result of this process, some false solutions are also produced and the ambiguity seems unresolvable. Our approach is to apply a transformation derived from the results of the subspace decomposition on the received signal and then to inspect their statistics. It is shown that the second-order statistics of the transformed signal provides a reliable means for removing the false solutions.

  11. Spreading Sequence Design and Theoretical Limits for Quasisynchronous CDMA Systems

    Directory of Open Access Journals (Sweden)

    Fan Pingzhi

    2004-01-01

    Full Text Available For various quasisynchronous (QS CDMA systems such as LAS-CDMA system which emerged recently, in order to reduce or eliminate the multiple access interference and multipath interference, it is required to design a set of spreading sequences which are mutually orthogonal within a designed shift zone, called orthogonal zone. For traditional orthogonal sequences, such as Walsh sequences and orthogonal Gold sequences, the orthogonality can only be achieved at the inphase point; in other words, the orthogonality is destroyed whenever there is a relative shift between the sequences, that is, their orthogonal zone is 0. In this paper, new concepts of generalized orthogonality (GO and generalized quasiorthogonality (GQO for spreading sequence design in both direct sequence (DS QS-CDMA systems and time/frequency hopping (TH/FH QS-CDMA systems are presented. Besides, selected GO/GQO sequence designs and general theoretical periodic and aperiodic limits, together with several applications in QS-CDMA systems, are also reviewed and analyzed.

  12. Novel communication scheme based on chaotic Roessler circuits

    International Nuclear Information System (INIS)

    GarcIa-Lopez, J H; Jaimes-Reategui, R; Pisarchik, A N; MurguIa-Hernandez, A; Medina-Gutierrez, C; Valdivia-Hernadez, R; Villafana-Rauda, E

    2005-01-01

    We present a novel synchronization scheme for secure communication with two chaotic unidirectionally coupled Roessler circuits. The circuits are synchronized via one of the variables, while a signal is transmitted through another variable. We show that this scheme allows more stable communications. The system dynamics is studied numerically and experimentally in a wide range of a control parameter. The possibility of secure communications with an audio signal is demonstrated

  13. Selecting registration schemes in case of interstitial lung disease follow-up in CT

    International Nuclear Information System (INIS)

    Vlachopoulos, Georgios; Korfiatis, Panayiotis; Skiadopoulos, Spyros; Kazantzi, Alexandra; Kalogeropoulou, Christina; Pratikakis, Ioannis; Costaridou, Lena

    2015-01-01

    Purpose: Primary goal of this study is to select optimal registration schemes in the framework of interstitial lung disease (ILD) follow-up analysis in CT. Methods: A set of 128 multiresolution schemes composed of multiresolution nonrigid and combinations of rigid and nonrigid registration schemes are evaluated, utilizing ten artificially warped ILD follow-up volumes, originating from ten clinical volumetric CT scans of ILD affected patients, to select candidate optimal schemes. Specifically, all combinations of four transformation models (three rigid: rigid, similarity, affine and one nonrigid: third order B-spline), four cost functions (sum-of-square distances, normalized correlation coefficient, mutual information, and normalized mutual information), four gradient descent optimizers (standard, regular step, adaptive stochastic, and finite difference), and two types of pyramids (recursive and Gaussian-smoothing) were considered. The selection process involves two stages. The first stage involves identification of schemes with deformation field singularities, according to the determinant of the Jacobian matrix. In the second stage, evaluation methodology is based on distance between corresponding landmark points in both normal lung parenchyma (NLP) and ILD affected regions. Statistical analysis was performed in order to select near optimal registration schemes per evaluation metric. Performance of the candidate registration schemes was verified on a case sample of ten clinical follow-up CT scans to obtain the selected registration schemes. Results: By considering near optimal schemes common to all ranking lists, 16 out of 128 registration schemes were initially selected. These schemes obtained submillimeter registration accuracies in terms of average distance errors 0.18 ± 0.01 mm for NLP and 0.20 ± 0.01 mm for ILD, in case of artificially generated follow-up data. Registration accuracy in terms of average distance error in clinical follow-up data was in the

  14. Selecting registration schemes in case of interstitial lung disease follow-up in CT

    Energy Technology Data Exchange (ETDEWEB)

    Vlachopoulos, Georgios; Korfiatis, Panayiotis; Skiadopoulos, Spyros; Kazantzi, Alexandra [Department of Medical Physics, School of Medicine,University of Patras, Patras 26504 (Greece); Kalogeropoulou, Christina [Department of Radiology, School of Medicine, University of Patras, Patras 26504 (Greece); Pratikakis, Ioannis [Department of Electrical and Computer Engineering, Democritus University of Thrace, Xanthi 67100 (Greece); Costaridou, Lena, E-mail: costarid@upatras.gr [Department of Medical Physics, School of Medicine, University of Patras, Patras 26504 (Greece)

    2015-08-15

    Purpose: Primary goal of this study is to select optimal registration schemes in the framework of interstitial lung disease (ILD) follow-up analysis in CT. Methods: A set of 128 multiresolution schemes composed of multiresolution nonrigid and combinations of rigid and nonrigid registration schemes are evaluated, utilizing ten artificially warped ILD follow-up volumes, originating from ten clinical volumetric CT scans of ILD affected patients, to select candidate optimal schemes. Specifically, all combinations of four transformation models (three rigid: rigid, similarity, affine and one nonrigid: third order B-spline), four cost functions (sum-of-square distances, normalized correlation coefficient, mutual information, and normalized mutual information), four gradient descent optimizers (standard, regular step, adaptive stochastic, and finite difference), and two types of pyramids (recursive and Gaussian-smoothing) were considered. The selection process involves two stages. The first stage involves identification of schemes with deformation field singularities, according to the determinant of the Jacobian matrix. In the second stage, evaluation methodology is based on distance between corresponding landmark points in both normal lung parenchyma (NLP) and ILD affected regions. Statistical analysis was performed in order to select near optimal registration schemes per evaluation metric. Performance of the candidate registration schemes was verified on a case sample of ten clinical follow-up CT scans to obtain the selected registration schemes. Results: By considering near optimal schemes common to all ranking lists, 16 out of 128 registration schemes were initially selected. These schemes obtained submillimeter registration accuracies in terms of average distance errors 0.18 ± 0.01 mm for NLP and 0.20 ± 0.01 mm for ILD, in case of artificially generated follow-up data. Registration accuracy in terms of average distance error in clinical follow-up data was in the

  15. Maximal Ratio Combining Using Channel Estimation in Chaos Based Pilot-Added DS-CDMA System with Antenna Diversity

    Directory of Open Access Journals (Sweden)

    Meher Krishna Patel

    2017-01-01

    Full Text Available This paper presents an adaptive multiuser transceiver scheme for DS-CDMA systems in which pilot symbols are added to users’ data to estimate complex channel fading coefficients. The performance of receiver antenna diversity with maximal ratio combining (MRC technique is analyzed for imperfect channel estimation in flat fading environments. The complex fading coefficients are estimated using least mean square (LMS algorithm and these coefficients are utilized by the maximal ratio combiner for generating the decision variable. Probability of error in closed form is derived. Further, the effect of pilot signal power on bit error rate (BER and BER performance of multiplexed pilot and data signal transmission scenario are investigated. We have compared the performance of added and multiplexed pilot-data systems and concluded the advantages of both systems. The proposed CDMA technique uses the chaotic sequence as spreading sequence. Assuming proper synchronization, the computer simulation results demonstrate the better bit error rate performance in the presence of channel estimator in the chaotic based CDMA system and the receiver antenna diversity technique further improves the performance of the proposed system. Also, no channel estimator is required if there is no phase distortion to the transmitted signal.

  16. Reconfigurable Signal Processing and Hardware Architecture for Broadband Wireless Communications

    Directory of Open Access Journals (Sweden)

    Liang Ying-Chang

    2005-01-01

    Full Text Available This paper proposes a broadband wireless transceiver which can be reconfigured to any type of cyclic-prefix (CP -based communication systems, including orthogonal frequency-division multiplexing (OFDM, single-carrier cyclic-prefix (SCCP system, multicarrier (MC code-division multiple access (MC-CDMA, MC direct-sequence CDMA (MC-DS-CDMA, CP-based CDMA (CP-CDMA, and CP-based direct-sequence CDMA (CP-DS-CDMA. A hardware platform is proposed and the reusable common blocks in such a transceiver are identified. The emphasis is on the equalizer design for mobile receivers. It is found that after block despreading operation, MC-DS-CDMA and CP-DS-CDMA have the same equalization blocks as OFDM and SCCP systems, respectively, therefore hardware and software sharing is possible for these systems. An attempt has also been made to map the functional reconfigurable transceiver onto the proposed hardware platform. The different functional entities which will be required to perform the reconfiguration and realize the transceiver are explained.

  17. A secure communication scheme using projective chaos synchronization

    International Nuclear Information System (INIS)

    Li Zhigang; Xu Daolin

    2004-01-01

    Most secure communication schemes using chaotic dynamics are based on identical synchronization. In this paper, we show the possibility of secure communication using projective synchronization (PS). The unpredictability of the scaling factor in projective synchronization can additionally enhance the security of communication. It is also showed that the scaling factor can be employed to improve the robustness against noise contamination. The feasibility of the communication scheme in high-dimensional chaotic systems, such as the hyperchaotic Roessler system, is demonstrated. Numerical results show the success in transmitting a sound signal through chaotic systems

  18. Performance of Turbo Interference Cancellation Receivers in Space-Time Block Coded DS-CDMA Systems

    Directory of Open Access Journals (Sweden)

    Emmanuel Oluremi Bejide

    2008-07-01

    Full Text Available We investigate the performance of turbo interference cancellation receivers in the space time block coded (STBC direct-sequence code division multiple access (DS-CDMA system. Depending on the concatenation scheme used, we divide these receivers into the partitioned approach (PA and the iterative approach (IA receivers. The performance of both the PA and IA receivers is evaluated in Rayleigh fading channels for the uplink scenario. Numerical results show that the MMSE front-end turbo space-time iterative approach receiver (IA effectively combats the mixture of MAI and intersymbol interference (ISI. To further investigate the possible achievable data rates in the turbo interference cancellation receivers, we introduce the puncturing of the turbo code through the use of rate compatible punctured turbo codes (RCPTCs. Simulation results suggest that combining interference cancellation, turbo decoding, STBC, and RCPTC can significantly improve the achievable data rates for a synchronous DS-CDMA system for the uplink in Rayleigh flat fading channels.

  19. A New Quantum Communication Scheme by Using Bell States

    International Nuclear Information System (INIS)

    Cao Haijing; Chen Jing; Song Heshan

    2006-01-01

    A new quantum communication scheme based on entanglement swapping is presented. Simplified calculation symbols are adopted to realize the process. Quantum key distribution and quantum secure direct communication can be simultaneously accomplished in the scheme. Two legitimate communicators can secretly share four certain key bits and four random key bits via three EPR pairs (quantum channels).

  20. A Fast CT Reconstruction Scheme for a General Multi-Core PC

    Directory of Open Access Journals (Sweden)

    Kai Zeng

    2007-01-01

    Full Text Available Expensive computational cost is a severe limitation in CT reconstruction for clinical applications that need real-time feedback. A primary example is bolus-chasing computed tomography (CT angiography (BCA that we have been developing for the past several years. To accelerate the reconstruction process using the filtered backprojection (FBP method, specialized hardware or graphics cards can be used. However, specialized hardware is expensive and not flexible. The graphics processing unit (GPU in a current graphic card can only reconstruct images in a reduced precision and is not easy to program. In this paper, an acceleration scheme is proposed based on a multi-core PC. In the proposed scheme, several techniques are integrated, including utilization of geometric symmetry, optimization of data structures, single-instruction multiple-data (SIMD processing, multithreaded computation, and an Intel C++ compilier. Our scheme maintains the original precision and involves no data exchange between the GPU and CPU. The merits of our scheme are demonstrated in numerical experiments against the traditional implementation. Our scheme achieves a speedup of about 40, which can be further improved by several folds using the latest quad-core processors.

  1. A fast CT reconstruction scheme for a general multi-core PC.

    Science.gov (United States)

    Zeng, Kai; Bai, Erwei; Wang, Ge

    2007-01-01

    Expensive computational cost is a severe limitation in CT reconstruction for clinical applications that need real-time feedback. A primary example is bolus-chasing computed tomography (CT) angiography (BCA) that we have been developing for the past several years. To accelerate the reconstruction process using the filtered backprojection (FBP) method, specialized hardware or graphics cards can be used. However, specialized hardware is expensive and not flexible. The graphics processing unit (GPU) in a current graphic card can only reconstruct images in a reduced precision and is not easy to program. In this paper, an acceleration scheme is proposed based on a multi-core PC. In the proposed scheme, several techniques are integrated, including utilization of geometric symmetry, optimization of data structures, single-instruction multiple-data (SIMD) processing, multithreaded computation, and an Intel C++ compilier. Our scheme maintains the original precision and involves no data exchange between the GPU and CPU. The merits of our scheme are demonstrated in numerical experiments against the traditional implementation. Our scheme achieves a speedup of about 40, which can be further improved by several folds using the latest quad-core processors.

  2. Demonstration of the CDMA-mode CAOS smart camera.

    Science.gov (United States)

    Riza, Nabeel A; Mazhar, Mohsin A

    2017-12-11

    Demonstrated is the code division multiple access (CDMA)-mode coded access optical sensor (CAOS) smart camera suited for bright target scenarios. Deploying a silicon CMOS sensor and a silicon point detector within a digital micro-mirror device (DMD)-based spatially isolating hybrid camera design, this smart imager first engages the DMD starring mode with a controlled factor of 200 high optical attenuation of the scene irradiance to provide a classic unsaturated CMOS sensor-based image for target intelligence gathering. Next, this CMOS sensor provided image data is used to acquire a focused zone more robust un-attenuated true target image using the time-modulated CDMA-mode of the CAOS camera. Using four different bright light test target scenes, successfully demonstrated is a proof-of-concept visible band CAOS smart camera operating in the CDMA-mode using up-to 4096 bits length Walsh design CAOS pixel codes with a maximum 10 KHz code bit rate giving a 0.4096 seconds CAOS frame acquisition time. A 16-bit analog-to-digital converter (ADC) with time domain correlation digital signal processing (DSP) generates the CDMA-mode images with a 3600 CAOS pixel count and a best spatial resolution of one micro-mirror square pixel size of 13.68 μm side. The CDMA-mode of the CAOS smart camera is suited for applications where robust high dynamic range (DR) imaging is needed for un-attenuated un-spoiled bright light spectrally diverse targets.

  3. On Novel Access and Scheduling Schemes for IoT Communications

    Directory of Open Access Journals (Sweden)

    Zheng Jiang

    2016-01-01

    Full Text Available The Internet of Things (IoT is expected to foster the development of 5G wireless networks and requires the efficient support for a large number of simultaneous short message communications. To address these challenges, some existing works utilize new waveform and multiuser superposition transmission schemes to improve the capacity of IoT communication. In this paper, we will investigate the spatial degree of freedom of IoT devices based on their distribution, then extend the multiuser shared access (MUSA which is one of the typical MUST schemes to spatial domain, and propose two novel schemes, that is, the preconfigured access scheme and the joint spatial and code domain scheduling scheme, to enhance IoT communication. The results indicate that the proposed schemes can reduce the collision rate dramatically during the IoT random access procedure and improve the performance of IoT communication obviously. Based on the simulation results, it is also shown that the proposed scheduling scheme can achieve the similar performance to the corresponding brute-force scheduling but with lower complexity.

  4. Selective Adaptive Parallel Interference Cancellation for Multicarrier DS-CDMA Systems

    Directory of Open Access Journals (Sweden)

    Ahmed El-Sayed El-Mahdy

    2013-07-01

    Full Text Available In this paper, Selective Adaptive Parallel Interference Cancellation (SA-PIC technique is presented for Multicarrier Direct Sequence Code Division Multiple Access (MC DS-CDMA scheme. The motivation of using SA-PIC is that it gives high performance and at the same time, reduces the computational complexity required to perform interference cancellation. An upper bound expression of the bit error rate (BER for the SA-PIC under Rayleigh fading channel condition is derived. Moreover, the implementation complexities for SA-PIC and Adaptive Parallel Interference Cancellation (APIC are discussed and compared. The performance of SA-PIC is investigated analytically and validated via computer simulations.

  5. Improving performance of DS-CDMA systems using chaotic complex Bernoulli spreading codes

    Science.gov (United States)

    Farzan Sabahi, Mohammad; Dehghanfard, Ali

    2014-12-01

    The most important goal of spreading spectrum communication system is to protect communication signals against interference and exploitation of information by unintended listeners. In fact, low probability of detection and low probability of intercept are two important parameters to increase the performance of the system. In Direct Sequence Code Division Multiple Access (DS-CDMA) systems, these properties are achieved by multiplying the data information in spreading sequences. Chaotic sequences, with their particular properties, have numerous applications in constructing spreading codes. Using one-dimensional Bernoulli chaotic sequence as spreading code is proposed in literature previously. The main feature of this sequence is its negative auto-correlation at lag of 1, which with proper design, leads to increase in efficiency of the communication system based on these codes. On the other hand, employing the complex chaotic sequences as spreading sequence also has been discussed in several papers. In this paper, use of two-dimensional Bernoulli chaotic sequences is proposed as spreading codes. The performance of a multi-user synchronous and asynchronous DS-CDMA system will be evaluated by applying these sequences under Additive White Gaussian Noise (AWGN) and fading channel. Simulation results indicate improvement of the performance in comparison with conventional spreading codes like Gold codes as well as similar complex chaotic spreading sequences. Similar to one-dimensional Bernoulli chaotic sequences, the proposed sequences also have negative auto-correlation. Besides, construction of complex sequences with lower average cross-correlation is possible with the proposed method.

  6. LDPC-PPM Coding Scheme for Optical Communication

    Science.gov (United States)

    Barsoum, Maged; Moision, Bruce; Divsalar, Dariush; Fitz, Michael

    2009-01-01

    In a proposed coding-and-modulation/demodulation-and-decoding scheme for a free-space optical communication system, an error-correcting code of the low-density parity-check (LDPC) type would be concatenated with a modulation code that consists of a mapping of bits to pulse-position-modulation (PPM) symbols. Hence, the scheme is denoted LDPC-PPM. This scheme could be considered a competitor of a related prior scheme in which an outer convolutional error-correcting code is concatenated with an interleaving operation, a bit-accumulation operation, and a PPM inner code. Both the prior and present schemes can be characterized as serially concatenated pulse-position modulation (SCPPM) coding schemes. Figure 1 represents a free-space optical communication system based on either the present LDPC-PPM scheme or the prior SCPPM scheme. At the transmitting terminal, the original data (u) are processed by an encoder into blocks of bits (a), and the encoded data are mapped to PPM of an optical signal (c). For the purpose of design and analysis, the optical channel in which the PPM signal propagates is modeled as a Poisson point process. At the receiving terminal, the arriving optical signal (y) is demodulated to obtain an estimate (a^) of the coded data, which is then processed by a decoder to obtain an estimate (u^) of the original data.

  7. Performance of Reverse-Link Synchronous DS-CDMA System on a Frequency-Selective Multipath Fading Channel with Imperfect Power Control

    Directory of Open Access Journals (Sweden)

    Duk Kyung Kim

    2002-08-01

    Full Text Available We analyze the performance for reverse-link synchronous DS-CDMA system in a frequency-selective Rayleigh fading channel with an imperfect power control scheme. The performance degradation due to power control error (PCE, which is approximated by a log-normally distributed random variable, is estimated as a function of the standard deviation of the PCE. In addition, we investigate the impacts of the multipath intensity profile (MIP shape and the number of resolvable paths on the performance. Finally, the coded bit error performance is evaluated in order to estimate the system capacity. Comparing with the conventional CDMA system, we show an achievable gain of from 59% to 23% for reverse-link synchronous transmission technique (RLSTT in the presence of imperfect power control over asynchronous transmission for BER=10−6. As well, the effect of tradeoff between orthogonality and diversity can be seen according to the number of multipaths, and the tendency is kept even in the presence of PCE. We conclude that the capacity can be further improved via the RLSTT, because the DS-CDMA system is very sensitive to power control imperfections.

  8. Improved Fiber Bragg Grating Array OFFH-CDMA System Using a Novel Frequency-Overlapping Multigroup Method

    Science.gov (United States)

    Peng, Wei-Ren; Lin, Wen-Piao; Chi, Sien

    2006-03-01

    The authors propose a novel frequency-overlapping multigroup scheme for a passive all-optical fast-frequency hopped code-division multiple-access (OFFH-CDMA) system based on fiber Bragg grating array (FBGA). In the conventional scheme, the users are assigned those codes constructed on the nonoverlapping frequency slots, and therefore the bandgaps between the adjacent gratings are wasted. To make a more efficient use of the optical spectrum, the proposed scheme divided the users into several groups, and assigned the codes, which interleaved to each other to the different groups. In addition to the higher utilization of the spectrum, the interleaved nature of the frequency allocations of different groups will make the groups less correlated and, hence, lower the multiple-access interference (MAI). The corresponding codeset and its constraints for this new scheme are also developed and analyzed. The performance of the system in terms of the correlation functions and bit error rate (BER) are given in both the conventional and the proposed schemes. The numerical results show that, with the multigroup scheme, performance is much improved compared to the conventional scheme.

  9. Multicarrier Block-Spread CDMA for Broadband Cellular Downlink

    Directory of Open Access Journals (Sweden)

    Leus Geert

    2004-01-01

    Full Text Available Effective suppression of multiuser interference (MUI and mitigation of frequency-selective fading effects within the complexity constraints of the mobile constitute major challenges for broadband cellular downlink transceiver design. Existing wideband direct-sequence (DS code division multiple access (CDMA transceivers suppress MUI statistically by restoring the orthogonality among users at the receiver. However, they call for receive diversity and multichannel equalization to improve the fading effects caused by deep channel fades. Relying on redundant block spreading and linear precoding, we design a so-called multicarrier block-spread- (MCBS-CDMA transceiver that preserves the orthogonality among users and guarantees symbol detection, regardless of the underlying frequency-selective fading channels. These properties allow for deterministic MUI elimination through low-complexity block despreading and enable full diversity gains, irrespective of the system load. Different options to perform equalization and decoding, either jointly or separately, strike the trade-off between performance and complexity. To improve the performance over multi-input multi-output (MIMO multipath fading channels, our MCBS-CDMA transceiver combines well with space-time block-coding (STBC techniques, to exploit both multiantenna and multipath diversity gains, irrespective of the system load. Simulation results demonstrate the superior performance of MCBS-CDMA compared to competing alternatives.

  10. Multichannel Baseband Processor for Wideband CDMA

    Science.gov (United States)

    Jalloul, Louay M. A.; Lin, Jim

    2005-12-01

    The system architecture of the cellular base station modem engine (CBME) is described. The CBME is a single-chip multichannel transceiver capable of processing and demodulating signals from multiple users simultaneously. It is optimized to process different classes of code-division multiple-access (CDMA) signals. The paper will show that through key functional system partitioning, tightly coupled small digital signal processing cores, and time-sliced reuse architecture, CBME is able to achieve a high degree of algorithmic flexibility while maintaining efficiency. The paper will also highlight the implementation and verification aspects of the CBME chip design. In this paper, wideband CDMA is used as an example to demonstrate the architecture concept.

  11. Nonclassical lightstates in optical communication schemes

    International Nuclear Information System (INIS)

    Mattle, K. U.

    1997-11-01

    The present thesis is a result in theoretical and experimental work on quant information and quant communication. The first part describes a new high intense source for polarization entangled photon pairs. The high quality of the source is clearly demonstrated by violating a Bell-inequality in less than 5 minutes with 100 standard deviations. This new source is a genius tool for new experiments in the field of fundamental physics as well as applied physics. The next chapter shows an experimental implementation of an optical dense quantum coding scheme. The combination of Bell-state generation and analysis of this entangled states leads to a new nonclassical communication scheme, where the channel capacity is enhanced. A single two state photon can be used for coding and decoding 1.58 bit instead of 1 bit for classical two state systems. The following chapter discusses two photon interference effects for two independent light sources. In an experiment two independent fluorescence pulses show this kind of interference effects. The fifth chapter describes 3-photon interference effects. This nonclassical interference effect is the elementary process for the quantum teleportation scheme. In this scheme an unknown particle state is transmitted from A to B without sending the particle itself. (author)

  12. Design, comparative study and analysis of CDMA for different modulation techni

    Directory of Open Access Journals (Sweden)

    Arun Kumar

    2015-11-01

    Full Text Available In this work, we have design a MIMO–CDMA using 4 ∗ 8 antennas with the combination of MMSE (Minimum Mean square Error Equalizer for BPSK (Binary Phase shift Keying, QPSK (Quadrature Phase Shift Keying, 16-QAM, 64-QAM and 256-QAM (Quadrature Amplitude Modulation modulation schemes. The analysis is built on the basis of transmit–received signal, constellation and MMSE plot simulated on a MatLab/Simulink. On the basis of BER (Bit-Error-Rate, it is also concluded that this work is mostly suitable for high order modulation schemes as the BER of 16-qam, 64-QAM and 256-QAM is zero. The proposed study has increased the quality of the wireless link and Inter-Symbol-Interference (ISI is likewise cut by applying a combination of MMSE and MIMO (Multiple In and Multiple Out with OSTBC (Orthogonal space Time Block Code encoder and combiner.

  13. Spectral Subtraction Approach for Interference Reduction of MIMO Channel Wireless Systems

    Directory of Open Access Journals (Sweden)

    Tomohiro Ono

    2005-08-01

    Full Text Available In this paper, a generalized spectral subtraction approach for reducing additive impulsive noise, narrowband signals, white Gaussian noise and DS-CDMA interferences in MIMO channel DS-CDMA wireless communication systems is investigated. The interference noise reduction or suppression is essential problem in wireless mobile communication systems to improve the quality of communication. The spectrum subtraction scheme is applied to the interference noise reduction problems for noisy MIMO channel systems. The interferences in space and time domain signals can effectively be suppressed by selecting threshold values, and the computational load with the FFT is not large. Further, the fading effects of channel are compensated by spectral modification with the spectral subtraction process. In the simulations, the effectiveness of the proposed methods for the MIMO channel DS-CDMA is shown to compare with the conventional MIMO channel DS-CDMA.

  14. A Secure and Scalable Data Communication Scheme in Smart Grids

    Directory of Open Access Journals (Sweden)

    Chunqiang Hu

    2018-01-01

    Full Text Available The concept of smart grid gained tremendous attention among researchers and utility providers in recent years. How to establish a secure communication among smart meters, utility companies, and the service providers is a challenging issue. In this paper, we present a communication architecture for smart grids and propose a scheme to guarantee the security and privacy of data communications among smart meters, utility companies, and data repositories by employing decentralized attribute based encryption. The architecture is highly scalable, which employs an access control Linear Secret Sharing Scheme (LSSS matrix to achieve a role-based access control. The security analysis demonstrated that the scheme ensures security and privacy. The performance analysis shows that the scheme is efficient in terms of computational cost.

  15. Computationally Efficient Blind Code Synchronization for Asynchronous DS-CDMA Systems with Adaptive Antenna Arrays

    Directory of Open Access Journals (Sweden)

    Chia-Chang Hu

    2005-04-01

    Full Text Available A novel space-time adaptive near-far robust code-synchronization array detector for asynchronous DS-CDMA systems is developed in this paper. There are the same basic requirements that are needed by the conventional matched filter of an asynchronous DS-CDMA system. For the real-time applicability, a computationally efficient architecture of the proposed detector is developed that is based on the concept of the multistage Wiener filter (MWF of Goldstein and Reed. This multistage technique results in a self-synchronizing detection criterion that requires no inversion or eigendecomposition of a covariance matrix. As a consequence, this detector achieves a complexity that is only a linear function of the size of antenna array (J, the rank of the MWF (M, the system processing gain (N, and the number of samples in a chip interval (S, that is, 𝒪(JMNS. The complexity of the equivalent detector based on the minimum mean-squared error (MMSE or the subspace-based eigenstructure analysis is a function of 𝒪((JNS3. Moreover, this multistage scheme provides a rapid adaptive convergence under limited observation-data support. Simulations are conducted to evaluate the performance and convergence behavior of the proposed detector with the size of the J-element antenna array, the amount of the L-sample support, and the rank of the M-stage MWF. The performance advantage of the proposed detector over other DS-CDMA detectors is investigated as well.

  16. Multichannel Baseband Processor for Wideband CDMA

    Directory of Open Access Journals (Sweden)

    Jim Lin

    2005-07-01

    Full Text Available The system architecture of the cellular base station modem engine (CBME is described. The CBME is a single-chip multichannel transceiver capable of processing and demodulating signals from multiple users simultaneously. It is optimized to process different classes of code-division multiple-access (CDMA signals. The paper will show that through key functional system partitioning, tightly coupled small digital signal processing cores, and time-sliced reuse architecture, CBME is able to achieve a high degree of algorithmic flexibility while maintaining efficiency. The paper will also highlight the implementation and verification aspects of the CBME chip design. In this paper, wideband CDMA is used as an example to demonstrate the architecture concept.

  17. Impact of Different Spreading Codes Using FEC on DWT Based MC-CDMA System

    OpenAIRE

    Masum, Saleh; Kabir, M. Hasnat; Islam, Md. Matiqul; Shams, Rifat Ara; Ullah, Shaikh Enayet

    2012-01-01

    The effect of different spreading codes in DWT based MC-CDMA wireless communication system is investigated. In this paper, we present the Bit Error Rate (BER) performance of different spreading codes (Walsh-Hadamard code, Orthogonal gold code and Golay complementary sequences) using Forward Error Correction (FEC) of the proposed system. The data is analyzed and is compared among different spreading codes in both coded and uncoded cases. It is found via computer simulation that the performance...

  18. Average Likelihood Methods of Classification of Code Division Multiple Access (CDMA)

    Science.gov (United States)

    2016-05-01

    subject to code matrices that follows the structure given by (113). [⃗ yR y⃗I ] = √ Es 2L [ GR1 −GI1 GI2 GR2 ] [ QR −QI QI QR ] [⃗ bR b⃗I ] + [⃗ nR n⃗I... QR ] [⃗ b+ b⃗− ] + [⃗ n+ n⃗− ] (115) The average likelihood for type 4 CDMA (116) is a special case of type 1 CDMA with twice the code length and...AVERAGE LIKELIHOOD METHODS OF CLASSIFICATION OF CODE DIVISION MULTIPLE ACCESS (CDMA) MAY 2016 FINAL TECHNICAL REPORT APPROVED FOR PUBLIC RELEASE

  19. A hybrid path-oriented code assignment CDMA-based MAC protocol for underwater acoustic sensor networks.

    Science.gov (United States)

    Chen, Huifang; Fan, Guangyu; Xie, Lei; Cui, Jun-Hong

    2013-11-04

    Due to the characteristics of underwater acoustic channel, media access control (MAC) protocols designed for underwater acoustic sensor networks (UWASNs) are quite different from those for terrestrial wireless sensor networks. Moreover, in a sink-oriented network with event information generation in a sensor field and message forwarding to the sink hop-by-hop, the sensors near the sink have to transmit more packets than those far from the sink, and then a funneling effect occurs, which leads to packet congestion, collisions and losses, especially in UWASNs with long propagation delays. An improved CDMA-based MAC protocol, named path-oriented code assignment (POCA) CDMA MAC (POCA-CDMA-MAC), is proposed for UWASNs in this paper. In the proposed MAC protocol, both the round-robin method and CDMA technology are adopted to make the sink receive packets from multiple paths simultaneously. Since the number of paths for information gathering is much less than that of nodes, the length of the spreading code used in the POCA-CDMA-MAC protocol is shorter greatly than that used in the CDMA-based protocols with transmitter-oriented code assignment (TOCA) or receiver-oriented code assignment (ROCA). Simulation results show that the proposed POCA-CDMA-MAC protocol achieves a higher network throughput and a lower end-to-end delay compared to other CDMA-based MAC protocols.

  20. A Hybrid Path-Oriented Code Assignment CDMA-Based MAC Protocol for Underwater Acoustic Sensor Networks

    Directory of Open Access Journals (Sweden)

    Huifang Chen

    2013-11-01

    Full Text Available Due to the characteristics of underwater acoustic channel, media access control (MAC protocols designed for underwater acoustic sensor networks (UWASNs are quite different from those for terrestrial wireless sensor networks. Moreover, in a sink-oriented network with event information generation in a sensor field and message forwarding to the sink hop-by-hop, the sensors near the sink have to transmit more packets than those far from the sink, and then a funneling effect occurs, which leads to packet congestion, collisions and losses, especially in UWASNs with long propagation delays. An improved CDMA-based MAC protocol, named path-oriented code assignment (POCA CDMA MAC (POCA-CDMA-MAC, is proposed for UWASNs in this paper. In the proposed MAC protocol, both the round-robin method and CDMA technology are adopted to make the sink receive packets from multiple paths simultaneously. Since the number of paths for information gathering is much less than that of nodes, the length of the spreading code used in the POCA-CDMA-MAC protocol is shorter greatly than that used in the CDMA-based protocols with transmitter-oriented code assignment (TOCA or receiver-oriented code assignment (ROCA. Simulation results show that the proposed POCA-CDMA-MAC protocol achieves a higher network throughput and a lower end-to-end delay compared to other CDMA-based MAC protocols.

  1. A new chaotic secure communication scheme

    International Nuclear Information System (INIS)

    Hua Changchun; Yang Bo; Ouyang Gaoxiang; Guan Xinping

    2005-01-01

    A new chaotic secure communication scheme is constructed. Unified chaotic system is used to encrypt the emitted signal. Different from the existing chaotic secure communication methods, the useful information is embodied in the parameter of chaotic systems in this Letter. The receiver is designed which can succeed in recovering the former signal. Finally computer simulations are done to verify the proposed methods, and the results show that the obtained theoretic results are feasible and efficient

  2. A Review on Successive Interference Cancellation-Based Optical PPM-CDMA Signaling

    Science.gov (United States)

    Alsowaidi, Naif; Eltaif, Tawfig; Mokhtar, Mohd Ridzuan

    2017-06-01

    This paper presents a comprehensive review of successive interference cancellation (SIC) scheme using pulse position modulation (PPM) for optical code division multiple access (OCDMA) systems. SIC scheme focuses on high-intensity signal, which will be selected after all users were detected, and then it will be subtracted from the overall received signal, hence, generating a new received signal. This process continues till all users eliminated one by one have been detected. It is shown that the random location of the sequences due to PPM encoding can reduce the probability of concentrated buildup of the pulse overlap in any one-slot time, and support SIC to easily remove the effect of the strongest signal at each stage of the cancellation process. The system bit error rate (BER) performance with modified quadratic congruence (MQC) codes used as signature sequence has been investigated. A detailed theoretical analysis of proposed system taking into account the impact of imperfect interference cancellation, the loss produced from the splitting during encoding and decoding, the channel loss and multiple access interference is presented. Results show that under average effective power constraint optical CDMA system using SIC scheme with M-ary PPM modulation outperforms conventional correlator detector and SIC scheme with on-off keying (OOK) modulation.

  3. CDMA2000 Y WCDMA

    Directory of Open Access Journals (Sweden)

    Jaime Sánchez García

    2005-01-01

    Full Text Available Este artículo ofrece un panorama general de los sistemas de comunicaciones móviles celulares de tercera generación (3G que han tenido una mayor aceptación (CDMA2000 y WCDMA en el mercado, y una comparación basada en los puntos principales donde los sistemas difieren que indica las ventajas y desventajas de cada uno. Los sistemas de comunicaciones móviles celulares 3G ofrecen mayores capacidades de transmisión a los de segunda generación (2G, y permiten brindar, además de los tradicionales servicios de telefonía celular, servicios de comunicación de datos a velocidades más altas que los de 2G. Las redes CDMA2000 y WCDMA forman parte del estándar IMT-2000 definido por la Unión Internacional de Telecomunicaciones (ITU para sistemas de comunicaciones inalámbricas de tercera generación; éstas son redes de banda ancha que ofrecen mayores velocidades de transmisión de datos, servicios de internet y aplicaciones multimedia

  4. MAI statistics estimation and analysis in a DS-CDMA system

    Science.gov (United States)

    Alami Hassani, A.; Zouak, M.; Mrabti, M.; Abdi, F.

    2018-05-01

    A primary limitation of Direct Sequence Code Division Multiple Access DS-CDMA link performance and system capacity is multiple access interference (MAI). To examine the performance of CDMA systems in the presence of MAI, i.e., in a multiuser environment, several works assumed that the interference can be approximated by a Gaussian random variable. In this paper, we first develop a new and simple approach to characterize the MAI in a multiuser system. In addition to statistically quantifying the MAI power, the paper also proposes a statistical model for both variance and mean of the MAI for synchronous and asynchronous CDMA transmission. We show that the MAI probability density function (PDF) is Gaussian for the equal-received-energy case and validate it by computer simulations.

  5. Asynchronous error-correcting secure communication scheme based on fractional-order shifting chaotic system

    Science.gov (United States)

    Chao, Luo

    2015-11-01

    In this paper, a novel digital secure communication scheme is firstly proposed. Different from the usual secure communication schemes based on chaotic synchronization, the proposed scheme employs asynchronous communication which avoids the weakness of synchronous systems and is susceptible to environmental interference. Moreover, as to the transmission errors and data loss in the process of communication, the proposed scheme has the ability to be error-checking and error-correcting in real time. In order to guarantee security, the fractional-order complex chaotic system with the shifting of order is utilized to modulate the transmitted signal, which has high nonlinearity and complexity in both frequency and time domains. The corresponding numerical simulations demonstrate the effectiveness and feasibility of the scheme.

  6. Fast frequency hopping codes applied to SAC optical CDMA network

    Science.gov (United States)

    Tseng, Shin-Pin

    2015-06-01

    This study designed a fast frequency hopping (FFH) code family suitable for application in spectral-amplitude-coding (SAC) optical code-division multiple-access (CDMA) networks. The FFH code family can effectively suppress the effects of multiuser interference and had its origin in the frequency hopping code family. Additional codes were developed as secure codewords for enhancing the security of the network. In considering the system cost and flexibility, simple optical encoders/decoders using fiber Bragg gratings (FBGs) and a set of optical securers using two arrayed-waveguide grating (AWG) demultiplexers (DeMUXs) were also constructed. Based on a Gaussian approximation, expressions for evaluating the bit error rate (BER) and spectral efficiency (SE) of SAC optical CDMA networks are presented. The results indicated that the proposed SAC optical CDMA network exhibited favorable performance.

  7. Kalai-Smorodinsky bargaining solution for optimal resource allocation over wireless DS-CDMA visual sensor networks

    Science.gov (United States)

    Pandremmenou, Katerina; Kondi, Lisimachos P.; Parsopoulos, Konstantinos E.

    2012-01-01

    Surveillance applications usually require high levels of video quality, resulting in high power consumption. The existence of a well-behaved scheme to balance video quality and power consumption is crucial for the system's performance. In the present work, we adopt the game-theoretic approach of Kalai-Smorodinsky Bargaining Solution (KSBS) to deal with the problem of optimal resource allocation in a multi-node wireless visual sensor network (VSN). In our setting, the Direct Sequence Code Division Multiple Access (DS-CDMA) method is used for channel access, while a cross-layer optimization design, which employs a central processing server, accounts for the overall system efficacy through all network layers. The task assigned to the central server is the communication with the nodes and the joint determination of their transmission parameters. The KSBS is applied to non-convex utility spaces, efficiently distributing the source coding rate, channel coding rate and transmission powers among the nodes. In the underlying model, the transmission powers assume continuous values, whereas the source and channel coding rates can take only discrete values. Experimental results are reported and discussed to demonstrate the merits of KSBS over competing policies.

  8. Cellular responses to 836 MHz and 1,765 GHz CDMA radiations

    International Nuclear Information System (INIS)

    Park, Woong Yang; Seo, Jeong Sun; Paik, Jung Ki; Lim, Kye Jae; Yoon, Hyun Bo

    2002-01-01

    The effect of radiofrequency (RF) radiation in the cellular phone communication range (836.5 MHz and 1.765 GHz code division multiple access, CDMA) on tumorigenesis and other health effect was measured using the in vitro cell culture system. To determine whether 836.5 MHz or 1.765 GHz CDMA radiations have any genotoxic effects to induce neoplastic transformation, C3H 10T1/2 cells were exposed to either of the above radiations at a specific absorption rate (SAR) of 35.6W/Kg (836.5 MHz) and 38.2 W/kg(1.765 GHz) or sham- exposed at the same time for 7 days. Cells were maintained in incubators and refed with fresh growth medium every 3 days. At this SAR, radiofrequency radiation did not induce neoplastic transformation in vitro. The extent of alteration in the kinetics of cell proliferation indicated no significant differences between RF-radiation- and sham-exposed cells with respect to MTS assay and 8-OHdG. Under this experimental conditions tested, there is no evidence for the induction of genotoxic indices in human and mouse cells exposed in vitro for 7 days to 836.5 MHz or 1.765 GHz RF radiation at SARs of up to 35.6 or 38.2 W/kg

  9. Crest Factor Reduction in MC-CDMA Employing Carrier Interferometry Codes

    Directory of Open Access Journals (Sweden)

    Natarajan Balasubramaniam

    2004-01-01

    Full Text Available This paper addresses signal compactness issues in MC-CDMA employing carrier interferometry codes using the measure of crest factor (CF. Carrier interferometry codes, applied to N -carrier MC-CDMA systems, enable 2N users to simultaneously share the system bandwidth with minimal degradation in performance (relative to the N -orthogonal-user case. First, for a fully loaded ( K=N and K=2N users MC-CDMA system with practical values of N , it is shown that the CF in downlink transmission demonstrates desirable properties of low mean and low variance. The downlink CF degrades when the number of users in the system decreases. Next, the high CF observed in the uplink is characterized and the poor CF in a partially loaded downlink as well as uplink is effectively combated using Schroeder's analytical CF reduction techniques.

  10. A Mitigation Technique of High-Power MAI in the Multimedia Optical CDMA System with the Optical Power Selector

    Science.gov (United States)

    Ohba, Kohki; Miyazawa, Takaya; Sasase, Iwao

    In this paper, we propose a mitigation system of high-level multiple access interference (MAI) for multimedia optical Code-Division Multiple-Access (CDMA) systems using the optical power selector (OPS). The proposed system can eliminate high-intensity MAI at the receiver for low-priority users. Moreover, the proposed system can reduce by half the required number of code sequences compared to the conventional scheme. As a result, the proposed system can increase the number of weights at the same code-length and, thus, obtain higher code spreading gain. We analyze performances of the proposed system and show that both high-priority users and low-priority users achieve lower bit error rates in comparison to the conventional scheme.

  11. Single Carrier Cyclic Prefix-Assisted CDMA System with Frequency Domain Equalization for High Data Rate Transmission

    Directory of Open Access Journals (Sweden)

    Madhukumar A. S.

    2004-01-01

    Full Text Available Multiple-access interference and interfinger interference limit the capacity of conventional single-carrier DS-CDMA systems. Even though multicarrier CDMA posses the advantages of conventional CDMA and OFDM, it suffers from two major implementation difficulties such as peak-to-average power ratio and high sensitivity to frequency offset and RF phase noise. A novel approach based on single-carrier cyclic prefix-assisted CDMA has been proposed to overcome the disadvantages of single-carrier CDMA and multicarrier modulation. The usefulness of the proposed approach for high-speed packet access with simplified channel estimation procedures are investigated in this paper. The paper also proposes a data-dependent pilot structure for the downlink transmission of the proposed system for enhancing pilot-assisted channel estimation in frequency domain. The performance of the proposed pilot structure is compared against the data-independent common pilot structure. The proposed system is extensively simulated for different channel parameters with different channel estimation and equalization methods and the results are compared against conventional multicarrier CDMA systems with identical system specifications.

  12. Iterative Overlap FDE for Multicode DS-CDMA

    Science.gov (United States)

    Takeda, Kazuaki; Tomeba, Hiromichi; Adachi, Fumiyuki

    Recently, a new frequency-domain equalization (FDE) technique, called overlap FDE, that requires no GI insertion was proposed. However, the residual inter/intra-block interference (IBI) cannot completely be removed. In addition to this, for multicode direct sequence code division multiple access (DS-CDMA), the presence of residual interchip interference (ICI) after FDE distorts orthogonality among the spreading codes. In this paper, we propose an iterative overlap FDE for multicode DS-CDMA to suppress both the residual IBI and the residual ICI. In the iterative overlap FDE, joint minimum mean square error (MMSE)-FDE and ICI cancellation is repeated a sufficient number of times. The bit error rate (BER) performance with the iterative overlap FDE is evaluated by computer simulation.

  13. Monte-Carlo Simulation for PDC-Based Optical CDMA System

    Directory of Open Access Journals (Sweden)

    FAHIM AZIZ UMRANI

    2010-10-01

    Full Text Available This paper presents the Monte-Carlo simulation of Optical CDMA (Code Division Multiple Access systems, and analyse its performance in terms of the BER (Bit Error Rate. The spreading sequence chosen for CDMA is Perfect Difference Codes. Furthermore, this paper derives the expressions of noise variances from first principles to calibrate the noise for both bipolar (electrical domain and unipolar (optical domain signalling required for Monte-Carlo simulation. The simulated results conform to the theory and show that the receiver gain mismatch and splitter loss at the transceiver degrades the system performance.

  14. A Joint Optimization Criterion for Blind DS-CDMA Detection

    Directory of Open Access Journals (Sweden)

    Sergio A. Cruces-Alvarez

    2007-01-01

    Full Text Available This paper addresses the problem of the blind detection of a desired user in an asynchronous DS-CDMA communications system with multipath propagation channels. Starting from the inverse filter criterion introduced by Tugnait and Li in 2001, we propose to tackle the problem in the context of the blind signal extraction methods for ICA. In order to improve the performance of the detector, we present a criterion based on the joint optimization of several higher-order statistics of the outputs. An algorithm that optimizes the proposed criterion is described, and its improved performance and robustness with respect to the near-far problem are corroborated through simulations. Additionally, a simulation using measurements on a real software-radio platform at 5 GHz has also been performed.

  15. A Joint Optimization Criterion for Blind DS-CDMA Detection

    Science.gov (United States)

    Durán-Díaz, Iván; Cruces-Alvarez, Sergio A.

    2006-12-01

    This paper addresses the problem of the blind detection of a desired user in an asynchronous DS-CDMA communications system with multipath propagation channels. Starting from the inverse filter criterion introduced by Tugnait and Li in 2001, we propose to tackle the problem in the context of the blind signal extraction methods for ICA. In order to improve the performance of the detector, we present a criterion based on the joint optimization of several higher-order statistics of the outputs. An algorithm that optimizes the proposed criterion is described, and its improved performance and robustness with respect to the near-far problem are corroborated through simulations. Additionally, a simulation using measurements on a real software-radio platform at 5 GHz has also been performed.

  16. A color-communication scheme for digital imagery

    Science.gov (United States)

    Acosta, Alex

    1987-01-01

    Color pictures generated from digital images are frequently used by geologists, foresters, range managers, and others. These color products are preferred over black and white pictures because the human eye is more sensitive to color differences than to various shades of gray. Color discrimination is a function of perception, and therefore colors in these color composites are generally described subjectively, which can lead to ambiguous color communication. Numerous color-coordinate systems are available that quantitively relate digital triplets representing amounts of red, free, and blue to the parameters of hue, saturation, and intensity perceived by the eye. Most of these systems implement a complex transformation of the primary colors to a color space that is hard to visualize, thus making it difficult to relate digital triplets to perception parameters. This paper presents a color-communcation scheme that relates colors on a color triangle to corresponding values of "hue" (H), "saturation" (S), and chromaticity coordinates (x,y,z). The scheme simplifies the relation between red, green, and blue (RGB) digital triplets and the color generated by these triplets. Some examples of the use of the color-communication scheme in digital image processing are presented.

  17. Semi-quantum Secure Direct Communication Scheme Based on Bell States

    Science.gov (United States)

    Xie, Chen; Li, Lvzhou; Situ, Haozhen; He, Jianhao

    2018-06-01

    Recently, the idea of semi-quantumness has been often used in designing quantum cryptographic schemes, which allows some of the participants of a quantum cryptographic scheme to remain classical. One of the reasons why this idea is popular is that it allows a quantum information processing task to be accomplished by using quantum resources as few as possible. In this paper, we extend the idea to quantum secure direct communication(QSDC) by proposing a semi-quantum secure direct communication scheme. In the scheme, the message sender, Alice, encodes each bit into a Bell state |φ+> = 1/{√2}(|00> +|11> ) or |{Ψ }+> = 1/{√ 2}(|01> +|10> ), and the message receiver, Bob, who is classical in the sense that he can either let the qubit he received reflect undisturbed, or measure the qubit in the computational basis |0>, |1> and then resend it in the state he found. Moreover, the security analysis of our scheme is also given.

  18. An FPGA-based DS-CDMA multiuser demodulator employing adaptive multistage parallel interference cancellation

    Science.gov (United States)

    Li, Xinhua; Song, Zhenyu; Zhan, Yongjie; Wu, Qiongzhi

    2009-12-01

    Since the system capacity is severely limited, reducing the multiple access interfere (MAI) is necessary in the multiuser direct-sequence code division multiple access (DS-CDMA) system which is used in the telecommunication terminals data-transferred link system. In this paper, we adopt an adaptive multistage parallel interference cancellation structure in the demodulator based on the least mean square (LMS) algorithm to eliminate the MAI on the basis of overviewing various of multiuser dectection schemes. Neither a training sequence nor a pilot signal is needed in the proposed scheme, and its implementation complexity can be greatly reduced by a LMS approximate algorithm. The algorithm and its FPGA implementation is then derived. Simulation results of the proposed adaptive PIC can outperform some of the existing interference cancellation methods in AWGN channels. The hardware setup of mutiuser demodulator is described, and the experimental results based on it demonstrate that the simulation results shows large performance gains over the conventional single-user demodulator.

  19. Novel Quantum Secret Sharing and Controlled Communication Schemes Based on Einstein–Podolsky–Rosen Correlations

    International Nuclear Information System (INIS)

    Yuan, Li; Gui-Hua, Zeng

    2009-01-01

    Employing quantum registers, we first proposed a novel (2, 3) quantum threshold scheme based on Einstein–Podolsky–Rosen (EPR) correlations in this letter. Motivated by the present threshold scheme, we also propose a controlled communication scheme to transmit the secret message with a controller. In the communication protocol, the encoded quantum message carried by particles sequence, is transmitted by legitimate communicators

  20. Special Semaphore Scheme for UHF Spacecraft Communications

    Science.gov (United States)

    Butman, Stanley; Satorius, Edgar; Ilott, Peter

    2006-01-01

    A semaphore scheme has been devised to satisfy a requirement to enable ultrahigh- frequency (UHF) radio communication between a spacecraft descending from orbit to a landing on Mars and a spacecraft, in orbit about Mars, that relays communications between Earth and the lander spacecraft. There are also two subsidiary requirements: (1) to use UHF transceivers, built and qualified for operation aboard the spacecraft that operate with residual-carrier binary phase-shift-keying (BPSK) modulation at a selectable data rate of 8, 32, 128, or 256 kb/s; and (2) to enable low-rate signaling even when received signals become so weak as to prevent communication at the minimum BPSK rate of 8 kHz. The scheme involves exploitation of Manchester encoding, which is used in conjunction with residual-carrier modulation to aid the carrier-tracking loop. By choosing various sequences of 1s, 0s, or 1s alternating with 0s to be fed to the residual-carrier modulator, one would cause the modulator to generate sidebands at a fundamental frequency of 4 or 8 kHz and harmonics thereof. These sidebands would constitute the desired semaphores. In reception, the semaphores would be detected by a software demodulator.

  1. PET/CT detectability and classification of simulated pulmonary lesions using an SUV correction scheme

    Science.gov (United States)

    Morrow, Andrew N.; Matthews, Kenneth L., II; Bujenovic, Steven

    2008-03-01

    Positron emission tomography (PET) and computed tomography (CT) together are a powerful diagnostic tool, but imperfect image quality allows false positive and false negative diagnoses to be made by any observer despite experience and training. This work investigates PET acquisition mode, reconstruction method and a standard uptake value (SUV) correction scheme on the classification of lesions as benign or malignant in PET/CT images, in an anthropomorphic phantom. The scheme accounts for partial volume effect (PVE) and PET resolution. The observer draws a region of interest (ROI) around the lesion using the CT dataset. A simulated homogenous PET lesion of the same shape as the drawn ROI is blurred with the point spread function (PSF) of the PET scanner to estimate the PVE, providing a scaling factor to produce a corrected SUV. Computer simulations showed that the accuracy of the corrected PET values depends on variations in the CT-drawn boundary and the position of the lesion with respect to the PET image matrix, especially for smaller lesions. Correction accuracy was affected slightly by mismatch of the simulation PSF and the actual scanner PSF. The receiver operating characteristic (ROC) study resulted in several observations. Using observer drawn ROIs, scaled tumor-background ratios (TBRs) more accurately represented actual TBRs than unscaled TBRs. For the PET images, 3D OSEM outperformed 2D OSEM, 3D OSEM outperformed 3D FBP, and 2D OSEM outperformed 2D FBP. The correction scheme significantly increased sensitivity and slightly increased accuracy for all acquisition and reconstruction modes at the cost of a small decrease in specificity.

  2. Methodology and Implementation on DSP of Heuristic Multiuser DS/CDMA Detectors

    Directory of Open Access Journals (Sweden)

    Alex Miyamoto Mussi

    2010-12-01

    Full Text Available The growing number of users of mobile communications networks and the scarcity of the electromagnetic spectrum make the use of diversity techniques and detection/decoding efficient, such as the use of multiple antennas at the transmitter and/or receiver, multiuser detection (MuD – Multiuser Detection, among others, have an increasingly prominent role in the telecommunications landscape. This paper presents a design methodology based on digital signal processors (DSP – Digital Signal Processor with a view to the implementation of multiuser heuristics detectors in systems DS/CDMA (Direct Sequence Code Division Multiple Access. Heuristics detection techniques result in near-optimal performance in order to approach the performance of maximum-likelihood (ML. In this work, was employed the DSP development platform called the C6713 DSK, which is based in Texas TMS320C6713 processor. The heuristics techniques proposed are based on well established algorithms in the literature. The efficiency of the algorithms implemented in DSP has been evaluated numerically by computing the measure of bit error rate (BER. Finally, the feasibility of implementation in DSP could then be verified by comparing results from multiple Monte-Carlo simulation in Matlab, with those obtained from implementation on DSP. It also demonstrates the effective increase in performance and system capacity of DS/CDMA with the use of heuristic multiuser detection techniques, implemented directly in the DSP.

  3. DPLL implementation in carrier acquisition and tracking for burst DS-CDMA receivers.

    Science.gov (United States)

    Guan, Yun-feng; Zhang, Zhao-yang; Lai, Li-feng

    2003-01-01

    This paper presents the architectures, algorithms, and implementation considerations of the digital phase locked loop (DPLL) used for burst-mode packet DS-CDMA receivers. As we know, carrier offset is a rather challenging problem in CDMA system. According to different applications, different DPLL forms should be adopted to correct different maximum carrier offset in CDMA systems. One classical DPLL and two novel DPLL forms are discussed in the paper. The acquisition range of carrier offset can be widened by using the two novel DPLL forms without any performance degradation such as longer acquisition time or larger variance of the phase error. The maximum acquisition range is 1/(4T), where T is the symbol period. The design can be implemented by FPGA directly.

  4. Cross-Layer Admission Control Policy for CDMA Beamforming Systems

    Directory of Open Access Journals (Sweden)

    Sheng Wei

    2007-01-01

    Full Text Available A novel admission control (AC policy is proposed for the uplink of a cellular CDMA beamforming system. An approximated power control feasibility condition (PCFC, required by a cross-layer AC policy, is derived. This approximation, however, increases outage probability in the physical layer. A truncated automatic retransmission request (ARQ scheme is then employed to mitigate the outage problem. In this paper, we investigate the joint design of an AC policy and an ARQ-based outage mitigation algorithm in a cross-layer context. This paper provides a framework for joint AC design among physical, data-link, and network layers. This enables multiple quality-of-service (QoS requirements to be more flexibly used to optimize system performance. Numerical examples show that by appropriately choosing ARQ parameters, the proposed AC policy can achieve a significant performance gain in terms of reduced outage probability and increased system throughput, while simultaneously guaranteeing all the QoS requirements.

  5. A Distributed Intrusion Detection Scheme about Communication Optimization in Smart Grid

    Directory of Open Access Journals (Sweden)

    Yunfa Li

    2013-01-01

    Full Text Available We first propose an efficient communication optimization algorithm in smart grid. Based on the optimization algorithm, we propose an intrusion detection algorithm to detect malicious data and possible cyberattacks. In this scheme, each node acts independently when it processes communication flows or cybersecurity threats. And neither special hardware nor nodes cooperation is needed. In order to justify the feasibility and the availability of this scheme, a series of experiments have been done. The results show that it is feasible and efficient to detect malicious data and possible cyberattacks with less computation and communication cost.

  6. MC-DS-CDMA System based on DWT and STBC in ITU Multipath Fading Channels Model

    Directory of Open Access Journals (Sweden)

    Nader Abdullah Khadam

    2018-03-01

    Full Text Available In this paper, the performance of multicarrier direct sequence code division multiple access (MC-DS-CDMA in fixed MC-DS-CDMA and Mobile MC-DS-CDMA applications have been improved by using the compensations of space time block coding and Discrete Fast Fourier transforms (FFT or Discrete Wavelets transform DWT. These MC-DS-CDMA systems had been simulated using MATLAB 2015a. Through simulation of the proposed system, various parameters can be changed and tested. The Bit Error Rate (BERs of these systems are obtained over wide range of signal to noise ratio. All simulation results had been compared with each other using different subcarrier size of FFT or DWT with STBC for 1,2,3 and 4 antennas in transmitter and under different ITU multipath fading channels and different Doppler frequencies (fd. The proposed structures of STBC-MC-DS-CDMA system based on (DWT batter than based on (FFT in varies Doppler frequencies and subcarrier size. Also, proposed system with STBC based on 4 transmitters better than other systems based on 1 or 2 or 3 transmitters in all Doppler frequencies and subcarrier size in all simulation results.

  7. Investigation of CT and MRI findings of cranio-orbital communicating lesions

    International Nuclear Information System (INIS)

    Wang Zhenchang; Jiang Dingyao; Xian Junfang; An Yuzhi; Zhang Tianming; Li Bin; Liang Xihong; Yang Bentao

    2001-01-01

    Objective: To investigate CT and MRI findings of cranio-orbital communicating lesions so as to find out communicating passages and their imaging features. Methods: Fifty-one cases of cranio-orbital communicating lesions confirmed by pathology and follow-up results were studied. CT was performed in all cases and MRI in 45 cases. Post-contrast CT and MRI was completed in 44 cases. Results: There were 31 cases (60.8%) with lesions communicating between the orbital cavity and the cranial cavity through optic canal or superior orbital fissure showing communicating soft tissue mass and enlargement of optic canal or superior orbital fissure. Four cases of optic gliomas involving optic nerve and optic chiasm, three cases with meningiomas of optic nerve sheath, and 2 cases with retinoblastoma involving optic nerve and optic chiasm showed cranio-orbital communicating masses through the optic canal. Cranio-orbital communicating mass with enlargement of superior orbital fissure was found in 22 patients including 5 meningiomas, 4 neurogenic tumors, 1 dermoid cyst, 3 inflammatory pseudotumors, 2 Tolosa-Hunt syndromes and 7 metastases from nasopharyngeal carcinoma. In addition, 20 of 51 cases (39.2%) communicated through perforating blood vessels or bony defect resulted from tumor destruction. Of these lesions, there were 10 metastases showing bone destruction in orbital walls, 5 cases with en plaque meningiomas of sphenoid bone with marked hyperostosis and widespread dural involvement, 1 chondrosarcoma involving frontal lobe and orbit, 3 adenoid cystic carcinomas involving frontal lobe, and 1 malignant meningioma with bone destruction of the superior orbital wall. Conclusion: CT and MRI could definitely demonstrate communicating passages of cranio-orbital communicating lesions and their imaging changes, which could contribute to diagnosis and differential diagnosis and provide valuable information for determining treatment measures and surgical approach

  8. Modeling and Analysis of Cellular CDMA Forward Channel

    National Research Council Canada - National Science Library

    Tighe, Jan

    2001-01-01

    In this thesis, we develop the forward channel model for a DS-CDMA cellular system operating in a slow-flat Rayleigh fading and log normal shadowing environment, which incorporates the extended Hata...

  9. Design and Performance Analysis of an Adaptive Receiver for Multicarrier DS-CDMA

    Directory of Open Access Journals (Sweden)

    Wang Huahui

    2007-01-01

    Full Text Available An adaptive parallel interference cancelation (APIC scheme is proposed for the multicarrier direct sequence code division multiple access (MC-DS-CDMA system. Frequency diversity inherent in the MC system is exploited through maximal ratio combining, and an adaptive least mean square algorithm is used to estimate the multiple access interference. Theoretical analysis on the bit-error rate (BER of the APIC receiver is presented. Under a unified signal model, the conventional PIC (CPIC is shown to be a special case of the APIC. Hence the BER derivation for the APIC is also applicable to the CPIC. The performance and the accuracy of the theoretical results are examined via simulations under different design parameters, which show that the APIC outperforms the CPIC receiver provided that the adaptive parameters are properly selected.

  10. Unequal error control scheme for dimmable visible light communication systems

    Science.gov (United States)

    Deng, Keyan; Yuan, Lei; Wan, Yi; Li, Huaan

    2017-01-01

    Visible light communication (VLC), which has the advantages of a very large bandwidth, high security, and freedom from license-related restrictions and electromagnetic-interference, has attracted much interest. Because a VLC system simultaneously performs illumination and communication functions, dimming control, efficiency, and reliable transmission are significant and challenging issues of such systems. In this paper, we propose a novel unequal error control (UEC) scheme in which expanding window fountain (EWF) codes in an on-off keying (OOK)-based VLC system are used to support different dimming target values. To evaluate the performance of the scheme for various dimming target values, we apply it to H.264 scalable video coding bitstreams in a VLC system. The results of the simulations that are performed using additive white Gaussian noises (AWGNs) with different signal-to-noise ratios (SNRs) are used to compare the performance of the proposed scheme for various dimming target values. It is found that the proposed UEC scheme enables earlier base layer recovery compared to the use of the equal error control (EEC) scheme for different dimming target values and therefore afford robust transmission for scalable video multicast over optical wireless channels. This is because of the unequal error protection (UEP) and unequal recovery time (URT) of the EWF code in the proposed scheme.

  11. Characterizing CDMA downlink feasibility via effective interference

    NARCIS (Netherlands)

    Endrayanto, A.I.; van den Berg, Hans Leo; Boucherie, Richardus J.

    2003-01-01

    This paper models and analyses downlink power assignment feasibility in Code Division Multiple Access (CDMA) mobile networks. By discretizing the area into small segments, the power requirements are characterized via a matrix representation that separates user and system characteristics. We obtain a

  12. Evolution to 3G Mobile Communication - Second Generation ...

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 8; Issue 9. Evolution to 3G Mobile Communication - Second Generation Cellular Systems. R Ramachandran. General Article Volume 8 Issue 9 September 2003 pp 60-72 ... Keywords. Wireless communication; cellular networks; GSM; CdmaOne; TDMA ...

  13. Rotated Walsh-Hadamard Spreading with Robust Channel Estimation for a Coded MC-CDMA System

    Directory of Open Access Journals (Sweden)

    Raulefs Ronald

    2004-01-01

    Full Text Available We investigate rotated Walsh-Hadamard spreading matrices for a broadband MC-CDMA system with robust channel estimation in the synchronous downlink. The similarities between rotated spreading and signal space diversity are outlined. In a multiuser MC-CDMA system, possible performance improvements are based on the chosen detector, the channel code, and its Hamming distance. By applying rotated spreading in comparison to a standard Walsh-Hadamard spreading code, a higher throughput can be achieved. As combining the channel code and the spreading code forms a concatenated code, the overall minimum Hamming distance of the concatenated code increases. This asymptotically results in an improvement of the bit error rate for high signal-to-noise ratio. Higher convolutional channel code rates are mostly generated by puncturing good low-rate channel codes. The overall Hamming distance decreases significantly for the punctured channel codes. Higher channel code rates are favorable for MC-CDMA, as MC-CDMA utilizes diversity more efficiently compared to pure OFDMA. The application of rotated spreading in an MC-CDMA system allows exploiting diversity even further. We demonstrate that the rotated spreading gain is still present for a robust pilot-aided channel estimator. In a well-designed system, rotated spreading extends the performance by using a maximum likelihood detector with robust channel estimation at the receiver by about 1 dB.

  14. Bit Error Rate Analysis for MC-CDMA Systems in Nakagami- Fading Channels

    Directory of Open Access Journals (Sweden)

    Li Zexian

    2004-01-01

    Full Text Available Multicarrier code division multiple access (MC-CDMA is a promising technique that combines orthogonal frequency division multiplexing (OFDM with CDMA. In this paper, based on an alternative expression for the -function, characteristic function and Gaussian approximation, we present a new practical technique for determining the bit error rate (BER of multiuser MC-CDMA systems in frequency-selective Nakagami- fading channels. The results are applicable to systems employing coherent demodulation with maximal ratio combining (MRC or equal gain combining (EGC. The analysis assumes that different subcarriers experience independent fading channels, which are not necessarily identically distributed. The final average BER is expressed in the form of a single finite range integral and an integrand composed of tabulated functions which can be easily computed numerically. The accuracy of the proposed approach is demonstrated with computer simulations.

  15. H∞ Channel Estimation for DS-CDMA Systems: A Partial Difference Equation Approach

    Directory of Open Access Journals (Sweden)

    Wei Wang

    2013-01-01

    Full Text Available In the communications literature, a number of different algorithms have been proposed for channel estimation problems with the statistics of the channel noise and observation noise exactly known. In practical systems, however, the channel parameters are often estimated using training sequences which lead to the statistics of the channel noise difficult to obtain. Moreover, the received signals are corrupted not only by the ambient noises but also by multiple-access interferences, so the statistics of observation noises is also difficult to obtain. In this paper, we will investigate the H∞ channel estimation problem for direct-sequence code-division multiple-access (DS-CDMA communication systems with time-varying multipath fading channels. The channel estimator is designed by applying a partial difference equation approach together with the innovation analysis theory. This method can give a sufficient and necessary condition for the existence of an H∞ channel estimator.

  16. Prediction of parent artery of anterior communicating artery aneurysm on CT angiography

    International Nuclear Information System (INIS)

    Chung, Jin Young; Han, Tae Il; Kim, Dae Hong; Han, Hyun Young; Kim, Hyun Jung; Song, Mun Kab

    1999-01-01

    To determine whether CT angiography can predict the parent artery of an anterior communicating aneurysm on the basis of characteristics of the aneurysm and precommunication anterior cerebral artery. Eighteen patients with anterior communication aneurysm were studied prospectively using CT angiography and conventional angiography. The parent artery of an aneurysm was predicted by evaluating aneurysm neck location, direction of aneurysm projection, and size of the precommunicating anterior cerebral artery, as seen on CT angiography. A somatom Plus-4 spiral CT scanner was used and shaded-surface display three-dimensional images were constructed. Aneurysm neck was located near the parent artery in 12 cases(66.7%), and aneurysm projection was against the parent artery in 11 cases(61.1%). The parent artery of the anterior cerebral artery was larger in 15 cases(83.3%), including ten cases of hypoplasia or agenesis of the contralateral anterior cerebral artery. In 17 of 18 aneurysms(94.4%) the parent artery seen on DSA was correctly predicted by CT angiography. The parent artery of an anterior communicating aneurysm can be predicted by evaluating aneurysm neck location, direction of aneurysm projection, and precommunicating anterior cerebral artery, as seen on CT angiography

  17. Analysis of synchronous digital-modulation schemes for satellite communication

    Science.gov (United States)

    Takhar, G. S.; Gupta, S. C.

    1975-01-01

    The multipath communication channel for space communications is modeled as a multiplicative channel. This paper discusses the effects of multiplicative channel processes on the symbol error rate for quadrature modulation (QM) digital modulation schemes. An expression for the upper bound on the probability of error is derived and numerically evaluated. The results are compared with those obtained for additive channels.

  18. Dispersion Compensation Requirements for Optical CDMA Using WDM Lasers

    International Nuclear Information System (INIS)

    Mendez, A J; Hendandez, V J; Feng, H X C; Heritage, J P; Lennon, W J

    2001-01-01

    Optical code division multiple access (O-CDMA) uses very narrow transmission pulses and is thus susceptible to fiber optic link impairments. When the O-CDMA is implemented as wavelength/time (W/T) matrices which use wavelength division multiplexing (WDM) sources such as multi-frequency laser transmitters, the susceptibility may be higher due to: (a) the large bandwidth utilized and (b) the requirement that the various wavelength components of the codes be synchronized at the point of modulation and encoding as well as after (optical) correlation. A computer simulation based on the nonlinear Schroedinger equation, developed to study optical networking on the National Transparent Optical Network (NTON), was modified to characterize the impairments on the propagation and decoding of W/T matrix codes over a link of the NTON. Three critical link impairments were identified by the simulation: group velocity dispersion (GVD); the flatness of the optical amplifier gain; and the slope of the GVD. Subsequently, experiments were carried out on the NTON link to verify and refine the simulations as well as to suggest improvements in the W/T matrix signal processing design. The NTON link measurements quantified the O-CDMA dispersion compensation requirements. Dispersion compensation management is essential to assure the performance of W/T matrix codes

  19. A New Quantum Secure Direct Communication Scheme with Authentication

    International Nuclear Information System (INIS)

    Dan, Liu; Chang-Xing, Pei; Dong-Xiao, Quan; Nan, Zhao

    2010-01-01

    A new quantum secure direct communication (QSDC) scheme with authentication is proposed based on polarized photons and EPR pairs. EPR pairs are used to transmit information, while polarized photons are used to detect Eve and their encoding bases are used to transmit authentication information. Alice and Bob have their own identity number which is shared by legal users only. The identity number is encoded on the bases of polarized photons and distilled if there is no Eve. Compared with other QSDC schemes with authentication, this new scheme is considerably easier and less expensive to implement in a practical setting

  20. Spread Spectrum Techniques and their Applications to Wireless Communications

    DEFF Research Database (Denmark)

    Prasad, Ramjee; Cianca, E.

    2005-01-01

    Spread Spectrum (SS) radio communications is on the verge of potentially explosive commercial development An SS-based multiple access, such as CDMA, has been chosen for 3G wireless communications. Other current applications of SS techniues are in Wireless LANs and Satellite Navigation Systems...

  1. Time Reversal UWB Communication System: A Novel Modulation Scheme with Experimental Validation

    Directory of Open Access Journals (Sweden)

    Khaleghi A

    2010-01-01

    Full Text Available A new modulation scheme is proposed for a time reversal (TR ultra wide-band (UWB communication system. The new modulation scheme uses the binary pulse amplitude modulation (BPAM and adds a new level of modulation to increase the data rate of a TR UWB communication system. Multiple data bits can be transmitted simultaneously with a cost of little added interference. Bit error rate (BER performance and the maximum achievable data rate of the new modulation scheme are theoretically analyzed. Two separate measurement campaigns are carried out to analyze the proposed modulation scheme. In the first campaign, the frequency responses of a typical indoor channel are measured and the performance is studied by the simulations using the measured frequency responses. Theoretical and the simulative performances are in strong agreement with each other. Furthermore, the BER performance of the proposed modulation scheme is compared with the performance of existing modulation schemes. It is shown that the proposed modulation scheme outperforms QAM and PAM for in an AWGN channel. In the second campaign, an experimental validation of the proposed modulation scheme is done. It is shown that the performances with the two measurement campaigns are in good agreement.

  2. Comparison of TCeMA and TDMA for Inter-Satellite Communications using OPNET Simulation

    Science.gov (United States)

    Hain, Regina Rosales; Ramanathan, Ram; Bergamo, Marcos; Wallett, Thomas M.

    2003-01-01

    A robust data link protocol, enabling unique physical and MAC layer technologies and sub-network level protocols, is needed in order to take advantage of the full potential of using both TDMA and CDMA in a satellite communication network. A novel MAC layer protocol, TDMA with CDMA-encoding multiple access (TCeMA) integrated with null-steered digital beam-forming spatial multiplexing, is investigated to support flexible spacecraft communications. Abstract models of the TCeMA and TDMA processes are developed in OPNFiT and a comparison of the performances of TCeMA and TDMA in a satellite network simulation are made. TCeMA provides the better connectivity and capacity with respect to TDMA for satellite communication traffic.

  3. A communicating Thread -CT- case study: JIWY

    NARCIS (Netherlands)

    Jovanovic, D.S.; Hilderink, G.H.; Broenink, Johannes F.; Pascoe, P.W.J.; Loader, R.; Sunderman, V.

    2002-01-01

    This JIWY demonstrator is constructed in the context of the development of a design framework and software tools to efficiently support mechatronic engineers in developing sophisticated control computer code out of a set control laws. We use the CSP-based Communicating Threads -CT- library as the

  4. Communication and Powering Scheme for Wireless and Battery-Less Measurement

    Directory of Open Access Journals (Sweden)

    A. Boura

    2012-04-01

    Full Text Available The paper presents solution for wireless and battery-less measurement in the enclosed areas. The principle is based on passive RFID, nevertheless this paper is focused on high power-demanding applications such as MEMS accelerometers, gas sensors, piezoresistive strain gauges, etc. Standard FRID communication scheme (sensing the input current change on the primary side cannot be used in this case, because the communication channel is overloaded by the high power load. Paper presents possible solution which is based on the dual frequency scheme – one frequency for powering and other for the communication. This is ensuring capability for measurement up to several centimeters on the frequency bands 125 kHz and 375 kHz. It can be suitable for continual measurement in isolated systems such as the rotating objects, concrete walls, enclosed plastic barrels, high temperature chambers etc.

  5. Quantum secure direct communication scheme using a W state and teleportation

    International Nuclear Information System (INIS)

    Cao Haijing; Song Heshan

    2006-01-01

    A theoretical scheme for quantum secure direct communication (QSDC) is proposed, where a three-qubit symmetric W state functions as a quantum channel. Two legitimate communicators can transmit their secret information by using quantum teleportation and local measurements

  6. BER Performance Simulation of Generalized MC DS-CDMA System with Time-Limited Blackman Chip Waveform

    Directory of Open Access Journals (Sweden)

    I. Develi

    2010-09-01

    Full Text Available Multiple access interference encountered in multicarrier direct sequence-code division multiple access (MC DS-CDMA is the most important difficulty that depends mainly on the correlation properties of the spreading sequences as well as the shape of the chip waveforms employed. In this paper, bit error rate (BER performance of the generalized MC DS-CDMA system that employs time-limited Blackman chip waveform is presented for Nakagami-m fading channels. Simulation results show that the use of Blackman chip waveform can improve the BER performance of the generalized MC DS-CDMA system, as compared to the performances achieved by using timelimited chip waveforms in the literature.

  7. Design and Smartphone-Based Implementation of a Chaotic Video Communication Scheme via WAN Remote Transmission

    Science.gov (United States)

    Lin, Zhuosheng; Yu, Simin; Li, Chengqing; Lü, Jinhu; Wang, Qianxue

    This paper proposes a chaotic secure video remote communication scheme that can perform on real WAN networks, and implements it on a smartphone hardware platform. First, a joint encryption and compression scheme is designed by embedding a chaotic encryption scheme into the MJPG-Streamer source codes. Then, multiuser smartphone communications between the sender and the receiver are implemented via WAN remote transmission. Finally, the transmitted video data are received with the given IP address and port in an Android smartphone. It should be noted that, this is the first time that chaotic video encryption schemes are implemented on such a hardware platform. The experimental results demonstrate that the technical challenges on hardware implementation of secure video communication are successfully solved, reaching a balance amongst sufficient security level, real-time processing of massive video data, and utilization of available resources in the hardware environment. The proposed scheme can serve as a good application example of chaotic secure communications for smartphone and other mobile facilities in the future.

  8. Particle Filtering for Multiple Access DS/CDMA Systems DS/CDMA Channel Estimation

    Directory of Open Access Journals (Sweden)

    Rafael Oliveira Ribeiro

    2013-09-01

    Full Text Available This article discusses computational implementation aspects and performance of a Bayesian methodology, namely particle filter (PF. The PF channel estimation technique is directly applied to the channel coefficients estimation of DS/CDMA systems. Simulation results for non-line-of-sight (NLOS Rayleigh fading channel propagation have indicated that the bootstrap PF estimator is capable to provide RMSE in the range of [10-3 ; 10-2] for a wide range of multiple access interference (MAI levels and signal-noise ratio (SNR, and still be able to offer robustness to near-far ratio (NFR effect.

  9. Breaking a chaos-noise-based secure communication scheme

    Science.gov (United States)

    Li, Shujun; Álvarez, Gonzalo; Chen, Guanrong; Mou, Xuanqin

    2005-03-01

    This paper studies the security of a secure communication scheme based on two discrete-time intermittently chaotic systems synchronized via a common random driving signal. Some security defects of the scheme are revealed: 1) The key space can be remarkably reduced; 2) the decryption is insensitive to the mismatch of the secret key; 3) the key-generation process is insecure against known/chosen-plaintext attacks. The first two defects mean that the scheme is not secure enough against brute-force attacks, and the third one means that an attacker can easily break the cryptosystem by approximately estimating the secret key once he has a chance to access a fragment of the generated keystream. Yet it remains to be clarified if intermittent chaos could be used for designing secure chaotic cryptosystems.

  10. The Study of MSADQ/CDMA Protocol in Voice/Data Integration Packet Networks

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    A new packet medium access protocol, namely, minislot signalingaccess based on distributed queues(MSADQ/CDMA), is proposed in voice and data intergration CDMA networks. The MSADQ protocol is based on distributed queues and collision resolution algorithm. Through proper management of the PN codes, the number of random competition collision reduces greatly, the multiple access interference (MAI) decreases. It has several special access signaling channels to carry the voice and data access request. Each slot is devided into several control minislots (CMSs), in which the Data Terminals (DT) or Voice Terminals (VT) transmit their request. According to the voice and data traffic character, the signaling access structure is proposed. The code assign rules and queue managing rules are also proposed to ensure the QoS requirement of each traffic. Comparisions with other three protocol are developed by simulation, which shows that MSADQ/CDMA protocol occupies less PN codes, but still has very good performance.

  11. A Chip-Level BSOR-Based Linear GSIC Multiuser Detector for Long-Code CDMA Systems

    Directory of Open Access Journals (Sweden)

    Benyoucef M

    2007-01-01

    Full Text Available We introduce a chip-level linear group-wise successive interference cancellation (GSIC multiuser structure that is asymptotically equivalent to block successive over-relaxation (BSOR iteration, which is known to outperform the conventional block Gauss-Seidel iteration by an order of magnitude in terms of convergence speed. The main advantage of the proposed scheme is that it uses directly the spreading codes instead of the cross-correlation matrix and thus does not require the calculation of the cross-correlation matrix (requires floating point operations (flops, where is the processing gain and is the number of users which reduces significantly the overall computational complexity. Thus it is suitable for long-code CDMA systems such as IS-95 and UMTS where the cross-correlation matrix is changing every symbol. We study the convergence behavior of the proposed scheme using two approaches and prove that it converges to the decorrelator detector if the over-relaxation factor is in the interval ]0, 2[. Simulation results are in excellent agreement with theory.

  12. A Chip-Level BSOR-Based Linear GSIC Multiuser Detector for Long-Code CDMA Systems

    Directory of Open Access Journals (Sweden)

    M. Benyoucef

    2008-01-01

    Full Text Available We introduce a chip-level linear group-wise successive interference cancellation (GSIC multiuser structure that is asymptotically equivalent to block successive over-relaxation (BSOR iteration, which is known to outperform the conventional block Gauss-Seidel iteration by an order of magnitude in terms of convergence speed. The main advantage of the proposed scheme is that it uses directly the spreading codes instead of the cross-correlation matrix and thus does not require the calculation of the cross-correlation matrix (requires 2NK2 floating point operations (flops, where N is the processing gain and K is the number of users which reduces significantly the overall computational complexity. Thus it is suitable for long-code CDMA systems such as IS-95 and UMTS where the cross-correlation matrix is changing every symbol. We study the convergence behavior of the proposed scheme using two approaches and prove that it converges to the decorrelator detector if the over-relaxation factor is in the interval ]0, 2[. Simulation results are in excellent agreement with theory.

  13. Super-Orthogonal Space-Time Turbo Transmit Diversity for CDMA

    Directory of Open Access Journals (Sweden)

    Pieter G. W. van Rooyen

    2005-05-01

    Full Text Available Studies have shown that transmit and receive diversity employing a combination of multiple transmit-receive antennas (given ideal channel state information (CSI and independent fading between antenna pairs will potentially yield maximum achievable system capacity. In this paper, the concept of a layered super-orthogonal turbo transmit diversity (SOTTD for downlink direct-sequence code-division multiple-access (CDMA systems is explored. This open-loop transmit diversity technique improves the downlink performance by using a small number of antenna elements at the base station and a single antenna at the handset. In the proposed technique, low-rate super-orthogonal code-spread CDMA is married with code-division transmit diversity (CDTD. At the mobile receiver, space-time (ST RAKE CDTD processing is combined with iterative turbo code-spread decoding to yield large ST gains. The performance of the SOTTD system is compared with single- and multiantenna turbo-coded (TC CDTD systems evaluated over a frequency-selective Rayleigh fading channel. The evaluation is done both by means of analysis and computer simulations. The performance results illustrate the superior performance of SOTTD compared to TC CDTD systems over practically the complete useful capacity range of CDMA. It is shown that the performance degradation characteristic of TC CDTD at low system loads (due to the inherent TC error floor is alleviated by the SOTTD system.

  14. Throughput performance analysis of multirate, multiclass S-ALOHA OFFH-CDMA packet networks

    DEFF Research Database (Denmark)

    Raddo, Thiago R.; Sanches, Anderson L.; Borges, Ben Hur V

    2015-01-01

    In this paper, we propose a new throughput expression for multirate, multiclass slotted-ALOHA optical fast frequency hopping code-division multiple-access (OFFH-CDMA) packet networks considering a Poisson distribution for packet composite arrivals. We analyze the packet throughput performance...... of a three-class OFFH-CDMA network, where multirate transmissions are achieved via manipulation of the user's code parameters. It is shown that users transmitting at low rates interfere considerably in the performance of high rate users. Finally, we perform a validation procedure to demonstrate...

  15. Multipass Channel Estimation and Joint Multiuser Detection and Equalization for MIMO Long-Code DS/CDMA Systems

    Directory of Open Access Journals (Sweden)

    Buzzi Stefano

    2006-01-01

    Full Text Available The problem of joint channel estimation, equalization, and multiuser detection for a multiantenna DS/CDMA system operating over a frequency-selective fading channel and adopting long aperiodic spreading codes is considered in this paper. First of all, we present several channel estimation and multiuser data detection schemes suited for multiantenna long-code DS/CDMA systems. Then, a multipass strategy, wherein the data detection and the channel estimation procedures exchange information in a recursive fashion, is introduced and analyzed for the proposed scenario. Remarkably, this strategy provides, at the price of some attendant computational complexity increase, excellent performance even when very short training sequences are transmitted, and thus couples together the conflicting advantages of both trained and blind systems, that is, good performance and no wasted bandwidth, respectively. Space-time coded systems are also considered, and it is shown that the multipass strategy provides excellent results for such systems also. Likewise, it is also shown that excellent performance is achieved also when each user adopts the same spreading code for all of its transmit antennas. The validity of the proposed procedure is corroborated by both simulation results and analytical findings. In particular, it is shown that adopting the multipass strategy results in a remarkable reduction of the channel estimation mean-square error and of the optimal length of the training sequence.

  16. Pilot-Assisted Channel Estimation for Orthogonal Multi-Carrier DS-CDMA with Frequency-Domain Equalization

    Science.gov (United States)

    Shima, Tomoyuki; Tomeba, Hiromichi; Adachi, Fumiyuki

    Orthogonal multi-carrier direct sequence code division multiple access (orthogonal MC DS-CDMA) is a combination of time-domain spreading and orthogonal frequency division multiplexing (OFDM). In orthogonal MC DS-CDMA, the frequency diversity gain can be obtained by applying frequency-domain equalization (FDE) based on minimum mean square error (MMSE) criterion to a block of OFDM symbols and can improve the bit error rate (BER) performance in a severe frequency-selective fading channel. FDE requires an accurate estimate of the channel gain. The channel gain can be estimated by removing the pilot modulation in the frequency domain. In this paper, we propose a pilot-assisted channel estimation suitable for orthogonal MC DS-CDMA with FDE and evaluate, by computer simulation, the BER performance in a frequency-selective Rayleigh fading channel.

  17. Effects of optical layer impairments on 2.5 Gb/s optical CDMA transmission.

    Science.gov (United States)

    Feng, H; Mendez, A; Heritage, J; Lennon, W

    2000-07-03

    We conducted a computer simulation study to assess the effects of optical layer impairments on optical CDMA (O-CDMA) transmission of 8 asynchronous users at 2.5 Gb/s each user over a 214-km link. It was found that with group velocity dispersion compensation, two other residual effects, namely, the nonzero chromatic dispersion slope of the single mode fiber (which causes skew) and the non-uniform EDFA gain (which causes interference power level to exceed signal power level of some codes) degrade the signal to multi-access interference (MAI) ratio. In contrast, four wave mixing and modulation due to the Kerr and Raman contributions to the fiber nonlinear refractive index are less important. Current wavelength-division multiplexing (WDM) technologies, including dispersion management, EDFA gain flattening, and 3 rd order dispersion compensation, are sufficient to overcome the impairments to the O-CDMA transmission system that we considered.

  18. Power adaptive multi-filter carrierless amplitude and phase access scheme for visible light communication network

    Science.gov (United States)

    Li, Wei; Huang, Zhitong; Li, Haoyue; Ji, Yuefeng

    2018-04-01

    Visible light communication (VLC) is a promising candidate for short-range broadband access due to its integration of advantages for both optical communication and wireless communication, whereas multi-user access is a key problem because of the intra-cell and inter-cell interferences. In addition, the non-flat channel effect results in higher losses for users in high frequency bands, which leads to unfair qualities. To solve those issues, we propose a power adaptive multi-filter carrierless amplitude and phase access (PA-MF-CAPA) scheme, and in the first step of this scheme, the MF-CAPA scheme utilizing multiple filters as different CAP dimensions is used to realize multi-user access. The character of orthogonality among the filters in different dimensions can mitigate the effect of intra-cell and inter-cell interferences. Moreover, the MF-CAPA scheme provides different channels modulated on the same frequency bands, which further increases the transmission rate. Then, the power adaptive procedure based on MF-CAPA scheme is presented to realize quality fairness. As demonstrated in our experiments, the MF-CAPA scheme yields an improved throughput compared with multi-band CAP access scheme, and the PA-MF-CAPA scheme enhances the quality fairness and further improves the throughput compared with the MF-CAPA scheme.

  19. Per-Pixel, Dual-Counter Scheme for Optical Communications

    Science.gov (United States)

    Farr, William H.; Bimbaum, Kevin M.; Quirk, Kevin J.; Sburlan, Suzana; Sahasrabudhe, Adit

    2013-01-01

    Free space optical communications links from deep space are projected to fulfill future NASA communication requirements for 2020 and beyond. Accurate laser-beam pointing is required to achieve high data rates at low power levels.This innovation is a per-pixel processing scheme using a pair of three-state digital counters to implement acquisition and tracking of a dim laser beacon transmitted from Earth for pointing control of an interplanetary optical communications system using a focal plane array of single sensitive detectors. It shows how to implement dim beacon acquisition and tracking for an interplanetary optical transceiver with a method that is suitable for both achieving theoretical performance, as well as supporting additional functions of high data rate forward links and precision spacecraft ranging.

  20. Multi-Hop Link Capacity of Multi-Route Multi-Hop MRC Diversity for a Virtual Cellular Network

    Science.gov (United States)

    Daou, Imane; Kudoh, Eisuke; Adachi, Fumiyuki

    In virtual cellular network (VCN), proposed for high-speed mobile communications, the signal transmitted from a mobile terminal is received by some wireless ports distributed in each virtual cell and relayed to the central port that acts as a gateway to the core network. In this paper, we apply the multi-route MHMRC diversity in order to decrease the transmit power and increase the multi-hop link capacity. The transmit power, the interference power and the link capacity are evaluated for DS-CDMA multi-hop VCN by computer simulation. The multi-route MHMRC diversity can be applied to not only DS-CDMA but also other access schemes (i. e. MC-CDMA, OFDM, etc.).

  1. Joint Transmitter-Receiver Optimization in the Downlink CDMA Systems

    Directory of Open Access Journals (Sweden)

    Mohammad Saquib

    2002-08-01

    Full Text Available To maximize the downlink code-division multiple access (CDMA system capacity, we propose to minimize the total transmitted power of the system subject to users′ signal-to-interference ratio (SIR requirements via designing optimum transmitter sequences and utilizing linear optimum receivers (minimum mean square error (MMSE receiver. In our work on joint transmitter-receiver design for the downlink CDMA systems with multiple antennas and multipath channels, we develop several optimization algorithms by considering various system constraints and prove their convergence. We empirically observed that under the optimization algorithm with no constraint on the system, the optimum receiver structure matches the received transmitter sequences. A simulation study is performed to see how the different practical system constraints penalize the system with respect to the optimum algorithm with no constraint on the system.

  2. PERFORMANCE IMPROVEMENT OF IDMA SCHEME USING CHAOTIC MAP INTERLEAVERS FOR FUTURE RADIO COMMUNICATION

    Directory of Open Access Journals (Sweden)

    Aasheesh Shukla

    2017-06-01

    Full Text Available In this paper, chaos based interleavers are proposed for the performance improvement of Interleave Division Multiple Access (IDMA henceforth for future radio communication (FRC requirements. ‘IDMA’ can be mean as the modified case of direct sequence code division multiple access (DS-CDMA with the same spreading sequences and user specific interleavers for distinguishing the users in multi-user environment. In IDMA systems, the roles of interleavers are pre-eminent and an efficient interleaver contributes in optimizing the system performance. Random interleaver is the popular and basic taxonomy in IDMA. The performance of chaos based interleavers is compared to random interleaver. Simulation results authenticate the performance of chaos based IDMA. Further the proposed chaotic map-interleavers have the less computational complexity and efficient in bandwidth compared to the existing prevailing interleaver algorithms in the domain. The IDMA system model uses a BPSK modulation and repetition coder with a code rate of ½. The system is simulated in MATLAB and results show the BER superiority of chaotic interleaver based IDMA without the need of extra storage resources and less computational complexity.

  3. GLONASS CDMA L3 ambiguity resolution and positioning

    NARCIS (Netherlands)

    Zaminpardaz, Safoora; Teunissen, P.J.G.; Nadarajah, Nandakumaran

    2016-01-01

    A first assessment of GLONASS CDMA L3 ambiguity resolution and positioning performance is provided. Our analyses are based on GLONASS L3 data from the satellite pair SVNs 755-801, received by two JAVAD receivers at Curtin University, Perth, Australia. In our analyses, four different versions of

  4. A Non-symmetric Digital Image Secure Communication Scheme Based on Generalized Chaos Synchronization System

    International Nuclear Information System (INIS)

    Zhang Xiaohong; Min Lequan

    2005-01-01

    Based on a generalized chaos synchronization system and a discrete Sinai map, a non-symmetric true color (RGB) digital image secure communication scheme is proposed. The scheme first changes an ordinary RGB digital image with 8 bits into unrecognizable disorder codes and then transforms the disorder codes into an RGB digital image with 16 bits for transmitting. A receiver uses a non-symmetric key to verify the authentication of the received data origin, and decrypts the ciphertext. The scheme can encrypt and decrypt most formatted digital RGB images recognized by computers, and recover the plaintext almost without any errors. The scheme is suitable to be applied in network image communications. The analysis of the key space, sensitivity of key parameters, and correlation of encrypted images imply that this scheme has sound security.

  5. A combinatorial approximation algorithm for CDMA downlink rate allocation

    NARCIS (Netherlands)

    Boucherie, Richardus J.; Bumb, A.F.; Endrayanto, A.I.; Woeginger, Gerhard; Raghavan, S.; Anandalingam, G.

    2006-01-01

    This paper presents a combinatorial algorithm for downlink rate allocation in Code Division Multiple Access (CDMA) mobile networks. By discretizing the coverage area into small segments, the transmit power requirements are characterized via a matrix representation that separates user and system

  6. A combinatorial approximation algorithm for CDMA downlink rate allocation

    NARCIS (Netherlands)

    Boucherie, Richardus J.; Bumb, A.F.; Endrayanto, A.I.; Woeginger, Gerhard

    2004-01-01

    This paper presents a combinatorial algorithm for downlink rate allocation in Code Division Multiple Access (CDMA) mobile networks. By discretizing the coverage area into small segments, the transmit power requirements are characterized via a matrix representation that separates user and system

  7. Performance comparison of binary modulation schemes for visible light communication

    KAUST Repository

    Park, Kihong

    2015-09-11

    In this paper, we investigate the power spectral density of several binary modulation schemes including variable on-off keying, variable pulse position modulation, and pulse dual slope modulation which were previously proposed for visible light communication with dimming control. We also propose a novel slope-based modulation called differential chip slope modulation (DCSM) and develop a chip-based hard-decision receiver to demodulate the resulting signal, detect the chip sequence, and decode the input bit sequence. We show that the DCSM scheme can exploit spectrum density more efficiently than the reference schemes while providing an error rate performance comparable to them. © 2015 IEEE.

  8. Principles of spread-spectrum communication systems

    CERN Document Server

    Torrieri, Don

    2015-01-01

    This book provides a concise but lucid explanation of the fundamentals of spread-spectrum systems with an emphasis on theoretical principles. The choice of specific topics is tempered by the author’s judgment of their practical significance and interest to both researchers and system designers. The book contains many improved derivations of the classical theory and presents the latest research results that bring the reader to the frontier of the field. This third edition includes new coverage of topics such as CDMA networks, acquisition and synchronization in DS-CDMA cellular networks, hopsets for FH-CDMA ad hoc networks, implications of information theory, the central limit theorem, the power spectral density of FH/CPM complex envelopes, adaptive filters, and adaptive arrays.   ·         Focuses on the fundamentals of spread-spectrum communication systems and provides current examples of their applications ·         Includes problem sets at the end of each chapter to assist readers in co...

  9. Improved Iterative Parallel Interference Cancellation Receiver for Future Wireless DS-CDMA Systems

    Directory of Open Access Journals (Sweden)

    Andrea Bernacchioni

    2005-04-01

    Full Text Available We present a new turbo multiuser detector for turbo-coded direct sequence code division multiple access (DS-CDMA systems. The proposed detector is based on the utilization of a parallel interference cancellation (PIC and a bank of turbo decoders. The PIC is broken up in order to perform interference cancellation after each constituent decoder of the turbo decoding scheme. Moreover, in the paper we propose a new enhanced algorithm that provides a more accurate estimation of the signal-to-noise-plus-interference-ratio used in the tentative decision device and in the MAP decoding algorithm. The performance of the proposed receiver is evaluated by means of computer simulations for medium to very high system loads, in AWGN and multipath fading channel, and compared to recently proposed interference cancellation-based iterative MUD, by taking into account the number of iterations and the complexity involved. We will see that the proposed receiver outperforms the others especially for highly loaded systems.

  10. Proposed Integrated Marketing Communication of TELKOM FLEXI to Improve ITS Marketing Communication Effectiveness

    OpenAIRE

    Puspita, Fitri; Nasution, Reza Ashari

    2013-01-01

    PT Telkom facing a business issue where their new user and ARPU (average revenue per user) target for Flexi in 2011 was not achieved and despite having the biggest market share among CDMA operators, but in fact, Flexi's brand value was below its main competitor. There are several factors that cause this issue; one of them is marketing communication that became the focus of this final project. Researcher used the theory of integrated marketing communication (IMC), particularly regarding the ef...

  11. A Survey of Public Key Infrastructure-Based Security for Mobile Communication Systems

    Directory of Open Access Journals (Sweden)

    Mohammed Ramadan

    2016-08-01

    Full Text Available Mobile communication security techniques are employed to guard the communication between the network entities. Mobile communication cellular systems have become one of the most important communication systems in recent times and are used by millions of people around the world. Since the 1990s, considerable efforts have been taken to improve both the communication and security features of the mobile communications systems. However, these improvements divide the mobile communications field into different generations according to the communication and security techniques such as A3, A5 and A8 algorithms for 2G-GSM cellular system, 3G-authentication and key agreement (AKA, evolved packet system-authentication and key agreement (EPS-AKA, and long term evolution-authentication and key agreement (LTE-AKA algorithms for 3rd generation partnership project (3GPP systems. Furthermore, these generations have many vulnerabilities, and huge security work is involved to solve such problems. Some of them are in the field of the public key cryptography (PKC which requires a high computational cost and more network flexibility to be achieved. As such, the public key infrastructure (PKI is more compatible with the modern generations due to the superior communications features. This paper surveys the latest proposed works on the security of GSM, CDMA, and LTE cellular systems using PKI. Firstly, we present the security issues for each generation of mobile communication systems, then we study and analyze the latest proposed schemes and give some comparisons. Finally, we introduce some new directions for the future scope. This paper classifies the mobile communication security schemes according to the techniques used for each cellular system and covers some of the PKI-based security techniques such as authentication, key agreement, and privacy preserving.

  12. Forward Link Power Control Strategy and its Optimum Issue in CDMA Cellular Networks

    Institute of Scientific and Technical Information of China (English)

    2000-01-01

    In this paper, we propose a theoretical method in order to estimate the forward link outage probability and user capacity of a cellular system which are based on IS-95 CDMA standard, especialy impact of power control strategy and voice activity monitoring in the system under long-term fading effects, in which the light and heavy fadings are considered. According to the numerical results obtained in this paper, the power control strategy leads to approximately the threefold user capacity in contrast to the situation without power control strategy. The reults are compared with Interference-to-Signal Ratio (ISR) driven power control scheme[6][9] which can be used only for simulation of the system. The power control strategy not only improves the desired signal to the interference ratio in the reference user's receiver, but also offers uniform service to the user wherever it is located in the cell.

  13. Interference Cancellation Technique Based on Discovery of Spreading Codes of Interference Signals and Maximum Correlation Detection for DS-CDMA System

    Science.gov (United States)

    Hettiarachchi, Ranga; Yokoyama, Mitsuo; Uehara, Hideyuki

    This paper presents a novel interference cancellation (IC) scheme for both synchronous and asynchronous direct-sequence code-division multiple-access (DS-CDMA) wireless channels. In the DS-CDMA system, the multiple access interference (MAI) and the near-far problem (NFP) are the two factors which reduce the capacity of the system. In this paper, we propose a new algorithm that is able to detect all interference signals as an individual MAI signal by maximum correlation detection. It is based on the discovery of all the unknowing spreading codes of the interference signals. Then, all possible MAI patterns so called replicas are generated as a summation of interference signals. And the true MAI pattern is found by taking correlation between the received signal and the replicas. Moreover, the receiver executes MAI cancellation in a successive manner, removing all interference signals by single-stage. Numerical results will show that the proposed IC strategy, which alleviates the detrimental effect of the MAI and the near-far problem, can significantly improve the system performance. Especially, we can obtain almost the same receiving characteristics as in the absense of interference for asynchrnous system when received powers are equal. Also, the same performances can be seen under any received power state for synchronous system.

  14. Personal communications via ACTS satellite HBR transponders

    Science.gov (United States)

    Fang, Russell J. F.

    1991-01-01

    The concept of a fully meshed network of briefcase-sized terminals is presented for personal communications over Ka-band satellite transponders. In this concept, undesirable double-hop delays are avoided for voice communications. The bandwidth and power resources of the transponder are efficiently shared by users in a simple demand-assigned manner via code-division multiple access (CDMA). Voice, data, and facsimile are statistically multiplexed at each terminal. In order to minimize terminal costs, frequency-precorrected, and level-preadjusted continuous-wave tones are sent from the central network control station in each beam so that the terminals in each down-link beam can use these pilots as references for antenna acquisition and tracking, as reliable frequency sources, and as indicators of signal fade for up-link power control (ULPC). The potential CDMA 'near-far' problem due to up-link fades is mitigated by using ULPC. Quasi-burst mode transmission is employed to minimize the potential clock and pseudorandom number code synchronization.

  15. An efficient communication scheme for solving Sn equations on message-passing multiprocessors

    International Nuclear Information System (INIS)

    Azmy, Y.Y.

    1993-01-01

    Early models of Intel's hypercube multiprocessors, e.g., the iPSC/1 and iPSC/2, were characterized by the high latency of message passing. This relatively weak dependence of the communication penalty on the size of messages, in contrast to its strong dependence on the number of messages, justified using the Fan-in Fan-out algorithm (which implements a minimum spanning tree path) to perform global operations, such as global sums, etc. Recent models of message-passing computers, such as the iPSC/860 and the Paragon, have been found to possess much smaller latency, thus forcing a reexamination of the issue of performance optimization with respect to communication schemes. Essentially, the Fan-in Fan-out scheme minimizes the number of nonsimultaneous messages sent but not the volume of data traffic across the network. Furthermore, if a global operation is performed in conjunction with the message passing, a large fraction of the attached nodes remains idle as the number of utilized processors is halved in each step of the process. On the other hand, the Recursive Halving scheme offers the smallest communication cost for global operations but has some drawbacks

  16. An efficient deterministic secure quantum communication scheme based on cluster states and identity authentication

    International Nuclear Information System (INIS)

    Wen-Jie, Liu; Han-Wu, Chen; Zhi-Qiang, Li; Zhi-Hao, Liu; Wen-Bo, Hu; Ting-Huai, Ma

    2009-01-01

    A novel efficient deterministic secure quantum communication scheme based on four-qubit cluster states and single-photon identity authentication is proposed. In this scheme, the two authenticated users can transmit two bits of classical information per cluster state, and its efficiency of the quantum communication is 1/3, which is approximately 1.67 times that of the previous protocol presented by Wang et al [Chin. Phys. Lett. 23 (2006) 2658]. Security analysis shows the present scheme is secure against intercept-resend attack and the impersonator's attack. Furthermore, it is more economic with present-day techniques and easily processed by a one-way quantum computer. (general)

  17. PPM-based relay communication schemes for wireless body area networks

    NARCIS (Netherlands)

    Zhang, P.; Willems, F.M.J.; Huang, Li

    2012-01-01

    This paper investigates cooperative communication schemes based on a single relay with pulse-position modulation (PPM) signaling, for enhancing energy efficiency of wireless body area networks (WBANs) in noncoherent channel settings. We explore cooperation between the source and the relay such that

  18. A modified chaos-based communication scheme using Hamiltonian forms and observer

    International Nuclear Information System (INIS)

    Lopez-Mancilla, D; Cruz-Hernandez, C; Posadas-Castillo, C

    2005-01-01

    In this work, a modified chaos-based communication scheme is presented. In particular, we use the modified scheme proposed by Lopez-Mancilla and Cruz-Hernandez (2005), that improves the basic scheme for chaotic masking using a single transmission channel proposed by Cuomo and coworkers (1993). It is extended for a special class of Generalized Hamiltonian systems. Substantial differences that significantly affect the reception quality of the sent message, with or without considering noise effect in the transmission channel are given. We use two Hamiltonian Lorenz systems unidirectionally coupled, the first like a master/transmitter system and the other like a slave/receiver system in order to illustrate with numerical simulations the effectiveness of the modified scheme, using chaos synchronization with Hamiltonian forms and observer

  19. A modified chaos-based communication scheme using Hamiltonian forms and observer

    Energy Technology Data Exchange (ETDEWEB)

    Lopez-Mancilla, D [Engineering Faculty, Baja California Autonomous University (UABC), Km. 103, Carretera Tijuana-Ensenada, 22860, Ensenada, B.C. (Mexico); Cruz-Hernandez, C [Telematics Direction, Scientific Research and Advanced Studies of Ensenada (CICESE), Km. 107 Carretera Tijuana-Ensenada, 22860 Ensenada, B.C. (Mexico); Posadas-Castillo, C [Engineering Faculty, Baja California Autonomous University (UABC), Km. 103, Carretera Tijuana-Ensenada, 22860, Ensenada, B.C. (Mexico); Faculty of Engineering Mechanic and Electrical (FIME), Nuevo Leon Autonomous University (UANL), Pedro de alba s/n Cd. Universitaria San Nicolas de los Garza N.L. (Mexico)

    2005-01-01

    In this work, a modified chaos-based communication scheme is presented. In particular, we use the modified scheme proposed by Lopez-Mancilla and Cruz-Hernandez (2005), that improves the basic scheme for chaotic masking using a single transmission channel proposed by Cuomo and coworkers (1993). It is extended for a special class of Generalized Hamiltonian systems. Substantial differences that significantly affect the reception quality of the sent message, with or without considering noise effect in the transmission channel are given. We use two Hamiltonian Lorenz systems unidirectionally coupled, the first like a master/transmitter system and the other like a slave/receiver system in order to illustrate with numerical simulations the effectiveness of the modified scheme, using chaos synchronization with Hamiltonian forms and observer.

  20. Efficient resource allocation scheme for visible-light communication system

    Science.gov (United States)

    Kim, Woo-Chan; Bae, Chi-Sung; Cho, Dong-Ho; Shin, Hong-Seok; Jung, D. K.; Oh, Y. J.

    2009-01-01

    A visible-light communication utilizing LED has many advantagies such as visibility of information, high SNR (Signal to Noise Ratio), low installation cost, usage of existing illuminators, and high security. Furthermore, exponentially increasing needs and quality of LED have helped the development of visible-light communication. The visibility is the most attractive property in visible-light communication system, but it is difficult to ensure visibility and transmission efficiency simultaneously during initial access because of the small amount of initial access process signals. In this paper, we propose an efficient resource allocation scheme at initial access for ensuring visibility with high resource utilization rate and low data transmission failure rate. The performance has been evaluated through the numerical analysis and simulation results.

  1. CLAS: A Novel Communications Latency Based Authentication Scheme

    Directory of Open Access Journals (Sweden)

    Zuochao Dou

    2017-01-01

    Full Text Available We design and implement a novel communications latency based authentication scheme, dubbed CLAS, that strengthens the security of state-of-the-art web authentication approaches by leveraging the round trip network communications latency (RTL between clients and authenticators. In addition to the traditional credentials, CLAS profiles RTL values of clients and uses them to defend against password compromise. The key challenges are (i to prevent RTL manipulation, (ii to alleviate network instabilities, and (iii to address mobile clients. CLAS addresses the first challenge by introducing a novel network architecture, which makes it extremely difficult for attackers to simulate legitimate RTL values. The second challenge is addressed by outlier removal and multiple temporal profiling, while the last challenge is addressed by augmenting CLAS with out-of-band-channels or other authentication schemes. CLAS restricts login to profiled locations while demanding additional information for nonprofiled ones, which highly reduces the attack surface even when the legitimate credentials are compromised. Additionally, unlike many state-of-the-art authentication mechanisms, CLAS is resilient to phishing, pharming, man-in-the-middle, and social engineering attacks. Furthermore, CLAS is transparent to users and incurs negligible overhead. The experimental results show that CLAS can achieve very low false positive and false negative rates.

  2. Accurate Bit Error Rate Calculation for Asynchronous Chaos-Based DS-CDMA over Multipath Channel

    Science.gov (United States)

    Kaddoum, Georges; Roviras, Daniel; Chargé, Pascal; Fournier-Prunaret, Daniele

    2009-12-01

    An accurate approach to compute the bit error rate expression for multiuser chaosbased DS-CDMA system is presented in this paper. For more realistic communication system a slow fading multipath channel is considered. A simple RAKE receiver structure is considered. Based on the bit energy distribution, this approach compared to others computation methods existing in literature gives accurate results with low computation charge. Perfect estimation of the channel coefficients with the associated delays and chaos synchronization is assumed. The bit error rate is derived in terms of the bit energy distribution, the number of paths, the noise variance, and the number of users. Results are illustrated by theoretical calculations and numerical simulations which point out the accuracy of our approach.

  3. Equalization of Multiuser Wireless CDMA Downlink Considering Transmitter Nonlinearity Using Walsh Codes

    Directory of Open Access Journals (Sweden)

    Pinter Stephen Z

    2007-01-01

    Full Text Available Transmitter nonlinearity has been a major issue in many scenarios: cellular wireless systems have high power RF amplifier (HPA nonlinearity at the base station; satellite downlinks have nonlinear TWT amplifiers in the satellite transponder and multipath conditions in the ground station; and radio-over-fiber (ROF systems consist of a nonlinear optical link followed by a wireless channel. In many cases, the nonlinearity is simply ignored if there is no out-of-band emission. This results in poor BER performance. In this paper we propose a new technique to estimate the linear part of the wireless downlink in the presence of a nonlinearity using Walsh codes; Walsh codes are commonly used in CDMA downlinks. Furthermore, we show that equalizer performance is significantly improved by taking into account the presence of the nonlinearity during channel estimation. This is shown by using a regular decision feedback equalizer (DFE with both wireless and RF amplifier noise. We perform estimation in a multiuser CDMA communication system where all users transmit their signal simultaneously. Correlation analysis is applied to identify the channel impulse response (CIR and the derivation of key correlation relationships is shown. A difficulty with using Walsh codes in terms of their correlations (compared to PN sequences is then presented, as well as a discussion on how to overcome it. Numerical evaluations show a good estimation of the linear system with 54 users in the downlink and a signal-to-noise ratio (SNR of 25 dB. Bit error rate (BER simulations of the proposed identification and equalization algorithms show a BER of achieved at an SNR of dB.

  4. SOFT AND SOFTER HANDOVER PERFORMANCE OF CDMA

    Directory of Open Access Journals (Sweden)

    Lina wati

    2010-12-01

    Full Text Available One of telecommunication providers in Indonesia applies CDMA2000 1x technology. The technology hasmany advantages such as larger channel capacity of BTS (Base Transceiver Station. On the other hand, thecapacity depends on user’s density. Therefore to guarantee voice connection when user or mobile station (MS isalways moving from one cell to others, handover technique is needed. However the technique can be failed for manyreasons. Therefore impact of call attempt on softer and soft handover performance is investigated. Hence the paperexamined soft – softer handover performance of CDMA in BTS (Base Transceiver Station, BSC, and Sectors inboth sub-urban and rural areas in Denpasar, Bali with area code of 0361.The research has been done in rural and suburban area with call area code ‘0361’. The analyses includedregression and simple linear correlation applications. The results showed that number of call attempts affected thefailure of soft and softer handover technique dominantly. Generally, average level of success both handover in bothrural and suburban area were about 99% which are above KPI (Key Performance Indicator reference at 98.50%.However in rural area, other factors such as blocking called attempt and error called number have caused the softerhandover failure.

  5. Multiuser receiver for DS-CDMA signals in multipath channels: an enhanced multisurface method.

    Science.gov (United States)

    Mahendra, Chetan; Puthusserypady, Sadasivan

    2006-11-01

    This paper deals with the problem of multiuser detection in direct-sequence code-division multiple-access (DS-CDMA) systems in multipath environments. The existing multiuser detectors can be divided into two categories: (1) low-complexity poor-performance linear detectors and (2) high-complexity good-performance nonlinear detectors. In particular, in channels where the orthogonality of the code sequences is destroyed by multipath, detectors with linear complexity perform much worse than the nonlinear detectors. In this paper, we propose an enhanced multisurface method (EMSM) for multiuser detection in multipath channels. EMSM is an intermediate piecewise linear detection scheme with a run-time complexity linear in the number of users. Its bit error rate performance is compared with existing linear detectors, a nonlinear radial basis function detector trained by the new support vector learning algorithm, and Verdu's optimal detector. Simulations in multipath channels, for both synchronous and asynchronous cases, indicate that it always outperforms all other linear detectors, performing nearly as well as nonlinear detectors.

  6. Capacity and coverage of power controlled CDMA cellular systems ...

    African Journals Online (AJOL)

    Coverage and capacity are among the ambitious challenges to be met by the third generation (3G) systems for successful deployment of its services to both residential and commercial subscribers. This paper reports on the performance study of CDMA systems in relation to an optimum step-regulated SNR-based ...

  7. Wireless Cellular Mobile Communications

    Directory of Open Access Journals (Sweden)

    V. Zalud

    2002-12-01

    Full Text Available In this article is briefly reviewed the history of wireless cellularmobile communications, examined the progress in current secondgeneration (2G cellular standards and discussed their migration to thethird generation (3G. The European 2G cellular standard GSM and itsevolution phases GPRS and EDGE are described somewhat in detail. Thethird generation standard UMTS taking up on GSM/GPRS core network andequipped with a new advanced access network on the basis of codedivision multiple access (CDMA is investigated too. A sketch of theperspective of mobile communication beyond 3G concludes this article.

  8. Bit Error Rate Performance of a MIMO-CDMA System Employing Parity-Bit-Selected Spreading in Frequency Nonselective Rayleigh Fading

    Directory of Open Access Journals (Sweden)

    Claude D'Amours

    2011-01-01

    Full Text Available We analytically derive the upper bound for the bit error rate (BER performance of a single user multiple input multiple output code division multiple access (MIMO-CDMA system employing parity-bit-selected spreading in slowly varying, flat Rayleigh fading. The analysis is done for spatially uncorrelated links. The analysis presented demonstrates that parity-bit-selected spreading provides an asymptotic gain of 10log(Nt dB over conventional MIMO-CDMA when the receiver has perfect channel estimates. This analytical result concurs with previous works where the (BER is determined by simulation methods and provides insight into why the different techniques provide improvement over conventional MIMO-CDMA systems.

  9. Network coding multiuser scheme for indoor visible light communications

    Science.gov (United States)

    Zhang, Jiankun; Dang, Anhong

    2017-12-01

    Visible light communication (VLC) is a unique alternative for indoor data transfer and developing beyond point-to-point. However, for realizing high-capacity networks, VLC is facing challenges including the constrained bandwidth of the optical access point and random occlusion. A network coding scheme for VLC (NC-VLC) is proposed, with increased throughput and system robustness. Based on the Lambertian illumination model, theoretical decoding failure probability of the multiuser NC-VLC system is derived, and the impact of the system parameters on the performance is analyzed. Experiments demonstrate the proposed scheme successfully in the indoor multiuser scenario. These results indicate that the NC-VLC system shows a good performance under the link loss and random occlusion.

  10. An Efficient Code-Timing Estimator for DS-CDMA Systems over Resolvable Multipath Channels

    Directory of Open Access Journals (Sweden)

    Jian Li

    2005-04-01

    Full Text Available We consider the problem of training-based code-timing estimation for the asynchronous direct-sequence code-division multiple-access (DS-CDMA system. We propose a modified large-sample maximum-likelihood (MLSML estimator that can be used for the code-timing estimation for the DS-CDMA systems over the resolvable multipath channels in closed form. Simulation results show that MLSML can be used to provide a high correct acquisition probability and a high estimation accuracy. Simulation results also show that MLSML can have very good near-far resistant capability due to employing a data model similar to that for adaptive array processing where strong interferences can be suppressed.

  11. A Low-Power WLAN Communication Scheme for IoT WLAN Devices Using Wake-Up Receivers

    Directory of Open Access Journals (Sweden)

    Hanseul Hong

    2018-01-01

    Full Text Available In this paper, we propose a delay- and power-efficient, multi-user, low-power wireless local area network (WLAN communication scheme for Internet of Things (IoT WLAN devices. Extremely low-power operation is one of the key requirements of emerging IoT devices. However, the current duty-cycle-based power saving approach may incur large access delay times owing to the trade-offs between the power consumption and the access delay. In order to reduce this delay and enhance the power-saving performance, wake-up receiver-based schemes have been proposed. However, because wake-up receiver-based schemes do not consider multiuser operation in dense communication environments, large delays are inevitable in the case of multiuser operation. In order to provide extremely low-power operation and under 1-mW standby power with reduced delay, we employed the optimized multiuser transmission scheduling of IEEE 802.11ax in the proposed scheme and proper enhanced distributed channel access (EDCA parameter settings. This is with the aim to reduce the delay caused by long wake-up times, and to avoid collisions caused by simultaneous transmission in uplink multiuser scenario. By using the proposed scheme, simultaneous IoT communication with multiple mobile IoT devices is possible while providing low-power operation. Simulation results verified the outstanding delay performance of the proposed scheme.

  12. A Novel Deterministic Secure Quantum Communication Scheme with Einstein—Podolsky—Rosen Pairs and Single Photons

    International Nuclear Information System (INIS)

    Wang Chao; Liu Jian-Wei; Liu Xiao; Shang Tao

    2013-01-01

    A novel deterministic secure quantum communication (DSQC) scheme is presented based on Einstein-Podolsky-Rosen (EPR) pairs and single photons in this study. In this scheme, the secret message can be encoded directly on the first particles of the prepared Bell states by simple unitary operations and decoded by performing the Bell-basis measurement after the additional classic information is exchanged. In addition, the strategy with two-step transmission of quantum data blocks and the technique of decoy-particle checking both are exploited to guarantee the security of the communication. Compared with some previous DSQC schemes, this scheme not only has a higher resource capacity, intrinsic efficiency and total efficiency, but also is more realizable in practical applications. Security analysis shows that the proposed scheme is unconditionally secure against various attacks over an ideal quantum channel and still conditionally robust over a noisy and lossy quantum channel. (general)

  13. Modeling and Analysis of DIPPM: A New Modulation Scheme for Visible Light Communications

    Directory of Open Access Journals (Sweden)

    Sana Ullah Jan

    2015-01-01

    Full Text Available Visible Light Communication (VLC uses an Intensity-Modulation and Direct-Detection (IM/DD scheme to transmit data. However, the light source used in VLC systems is continuously switched on and off quickly, resulting in flickering. In addition, recent illumination systems include dimming support to allow users to dim the light sources to the desired level. Therefore, the modulation scheme for data transmission in VLC system must include flicker mitigation and dimming control capabilities. In this paper, the authors propose a Double Inverse Pulse Position Modulation (DIPPM scheme that minimizes flickering and supports a high level of dimming for the illumination sources in VLC systems. To form DIPPM, some changes are made in the symbol structure of the IPPM scheme, and a detailed explanation and mathematical model of DIPPM are given in this paper. Furthermore, both analytical and simulation results for the error performance of 2-DIPPM are compared with the performance of VPPM. Also, the communication performance of DIPPM is analyzed in terms of the normalized required power.

  14. A General Model for Performance Evaluation in DS-CDMA Systems with Variable Spreading Factors

    Science.gov (United States)

    Chiaraluce, Franco; Gambi, Ennio; Righi, Giorgia

    This paper extends previous analytical approaches for the study of CDMA systems to the relevant case of multipath environments where users can operate at different bit rates. This scenario is of interest for the Wideband CDMA strategy employed in UMTS, and the model permits the performance comparison of classic and more innovative spreading signals. The method is based on the characteristic function approach, that allows to model accurately the various kinds of interferences. Some numerical examples are given with reference to the ITU-R M. 1225 Recommendations, but the analysis could be extended to different channel descriptions.

  15. DS-CDMA system outer loop power control and improvement for multi-service

    Institute of Scientific and Technical Information of China (English)

    Guan Mingxiang; Guo Qing; Li Xing

    2008-01-01

    When a new user accesses the CDMA system, the load will change drastically, and therefore, the advanced outer loop power control (OLPC) technology has to be adopted to enrich the target signal interference ratio (SIR) and improve the system performance. The existing problems about DS-CDMA outer loop power control for multi-service are introduced and the power control theoretical model is analyzed. System simulation is adopted on how to obtain the theoretical performance and parameter optimization of the power control algorithm. The OLPC algorithm is improved and the performance comparisons between the old algorithm and the improved algorithm are given. The results show good performance of the improved OLPC algorithm and prove the validity of the improved method for multi-service.

  16. A satellite mobile communication system based on Band-Limited Quasi-Synchronous Code Division Multiple Access (BLQS-CDMA)

    Science.gov (United States)

    Degaudenzi, R.; Elia, C.; Viola, R.

    1990-01-01

    Discussed here is a new approach to code division multiple access applied to a mobile system for voice (and data) services based on Band Limited Quasi Synchronous Code Division Multiple Access (BLQS-CDMA). The system requires users to be chip synchronized to reduce the contribution of self-interference and to make use of voice activation in order to increase the satellite power efficiency. In order to achieve spectral efficiency, Nyquist chip pulse shaping is used with no detection performance impairment. The synchronization problems are solved in the forward link by distributing a master code, whereas carrier forced activation and closed loop control techniques have been adopted in the return link. System performance sensitivity to nonlinear amplification and timing/frequency synchronization errors are analyzed.

  17. Space-time adaptive decision feedback neural receivers with data selection for high-data-rate users in DS-CDMA systems.

    Science.gov (United States)

    de Lamare, Rodrigo C; Sampaio-Neto, Raimundo

    2008-11-01

    A space-time adaptive decision feedback (DF) receiver using recurrent neural networks (RNNs) is proposed for joint equalization and interference suppression in direct-sequence code-division multiple-access (DS-CDMA) systems equipped with antenna arrays. The proposed receiver structure employs dynamically driven RNNs in the feedforward section for equalization and multiaccess interference (MAI) suppression and a finite impulse response (FIR) linear filter in the feedback section for performing interference cancellation. A data selective gradient algorithm, based upon the set-membership (SM) design framework, is proposed for the estimation of the coefficients of RNN structures and is applied to the estimation of the parameters of the proposed neural receiver structure. Simulation results show that the proposed techniques achieve significant performance gains over existing schemes.

  18. Multimedia transmission in MC-CDMA using adaptive subcarrier power allocation and CFO compensation

    Science.gov (United States)

    Chitra, S.; Kumaratharan, N.

    2018-02-01

    Multicarrier code division multiple access (MC-CDMA) system is one of the most effective techniques in fourth-generation (4G) wireless technology, due to its high data rate, high spectral efficiency and resistance to multipath fading. However, MC-CDMA systems are greatly deteriorated by carrier frequency offset (CFO) which is due to Doppler shift and oscillator instabilities. It leads to loss of orthogonality among the subcarriers and causes intercarrier interference (ICI). Water filling algorithm (WFA) is an efficient resource allocation algorithm to solve the power utilisation problems among the subcarriers in time-dispersive channels. The conventional WFA fails to consider the effect of CFO. To perform subcarrier power allocation with reduced CFO and to improve the capacity of MC-CDMA system, residual CFO compensated adaptive subcarrier power allocation algorithm is proposed in this paper. The proposed technique allocates power only to subcarriers with high channel to noise power ratio. The performance of the proposed method is evaluated using random binary data and image as source inputs. Simulation results depict that the bit error rate performance and ICI reduction capability of the proposed modified WFA offered superior performance in both power allocation and image compression for high-quality multimedia transmission in the presence of CFO and imperfect channel state information conditions.

  19. Electromagnetic Interference Assessment of CDMA and GSM Wireless Phones to Aircraft Navigation Radios

    Science.gov (United States)

    Ely, Jay J.; Nguyen, Truong X.; Koppen, Sandra V.; Salud, M. Theresa

    2002-01-01

    To address the concern for cellular phone electromagnetic interference (EMI) to aircraft radios, a radiated emission measurement process for CDMA (IS-95) and GSM (ETSI GSM 11.22) wireless handsets was developed. Spurious radiated emissions were efficiently characterized from devices tested in either a semi-anechoic or reverberation chamber, in terms of effective isotropic radiated power. Eight representative handsets (4 GSM, 4 CDMA) were commanded to operate while varying their radio transmitter parameters (power, modulation, etc.). This report provides a detailed description of the measurement process and resulting data, which may subsequently be used by others as a basis of consistent evaluation for cellular/PCS phones, Bluetooth, IEEE802.11b, IEEE802.11a, FRS/GMRS radios, and other portable transmitters. Aircraft interference path loss (IPL) and navigation radio interference threshold data from numerous reference documents, standards, and NASA partnerships were compiled. Using this data, a preliminary risk assessment is provided for CDMA and GSM wireless phone interference to aircraft localizer, Glideslope, VOR, and GPS radio receivers on typical transport airplanes. The report identifies where existing data for device emissions, IPL, and navigation radio interference thresholds needs to be extended for an accurate risk assessment for wireless transmitters in aircraft.

  20. A Novel Multiparty Quantum Secret Sharing Scheme of Secure Direct Communication Based on Bell States and Bell Measurements

    International Nuclear Information System (INIS)

    Shi Run-Hua; Huang Liu-Sheng; Yang Wei; Zhong Hong

    2011-01-01

    We present a novel quantum secret sharing scheme of secure direct communication and analyze its security. This scheme takes Einstein—Podolsky—Rosen (EPR) pairs in Bell states as quantum resources. In order to obtain the direct communication message, all agents only need to perform Bell measurements, not to perform any local unitary operation. The total efficiency in this scheme approaches 100% as the classical information exchanged is unnecessary except for the eavesdropping checks. (general)

  1. Iterative MMSE Detection for MIMO/BLAST DS-CDMA Systems in Frequency Selective Fading Channels - Achieving High Performance in Fully Loaded Systems

    Science.gov (United States)

    Silva, João Carlos; Souto, Nuno; Cercas, Francisco; Dinis, Rui

    A MMSE (Minimum Mean Square Error) DS-CDMA (Direct Sequence-Code Division Multiple Access) receiver coupled with a low-complexity iterative interference suppression algorithm was devised for a MIMO/BLAST (Multiple Input, Multiple Output / Bell Laboratories Layered Space Time) system in order to improve system performance, considering frequency selective fading channels. The scheme is compared against the simple MMSE receiver, for both QPSK and 16QAM modulations, under SISO (Single Input, Single Output) and MIMO systems, the latter with 2Tx by 2Rx and 4Tx by 4Rx (MIMO order 2 and 4 respectively) antennas. To assess its performance in an existing system, the uncoded UMTS HSDPA (High Speed Downlink Packet Access) standard was considered.

  2. An adaptive scaling and biasing scheme for OFDM-based visible light communication systems.

    Science.gov (United States)

    Wang, Zhaocheng; Wang, Qi; Chen, Sheng; Hanzo, Lajos

    2014-05-19

    Orthogonal frequency-division multiplexing (OFDM) has been widely used in visible light communication systems to achieve high-rate data transmission. Due to the nonlinear transfer characteristics of light emitting diodes (LEDs) and owing the high peak-to-average-power ratio of OFDM signals, the transmitted signal has to be scaled and biased before modulating the LEDs. In this contribution, an adaptive scaling and biasing scheme is proposed for OFDM-based visible light communication systems, which fully exploits the dynamic range of the LEDs and improves the achievable system performance. Specifically, the proposed scheme calculates near-optimal scaling and biasing factors for each specific OFDM symbol according to the distribution of the signals, which strikes an attractive trade-off between the effective signal power and the clipping-distortion power. Our simulation results demonstrate that the proposed scheme significantly improves the performance without changing the LED's emitted power, while maintaining the same receiver structure.

  3. Multilevel LDPC Codes Design for Multimedia Communication CDMA System

    Directory of Open Access Journals (Sweden)

    Hou Jia

    2004-01-01

    Full Text Available We design multilevel coding (MLC with a semi-bit interleaved coded modulation (BICM scheme based on low density parity check (LDPC codes. Different from the traditional designs, we joined the MLC and BICM together by using the Gray mapping, which is suitable to transmit the data over several equivalent channels with different code rates. To perform well at signal-to-noise ratio (SNR to be very close to the capacity of the additive white Gaussian noise (AWGN channel, random regular LDPC code and a simple semialgebra LDPC (SA-LDPC code are discussed in MLC with parallel independent decoding (PID. The numerical results demonstrate that the proposed scheme could achieve both power and bandwidth efficiency.

  4. Color coded multiple access scheme for bidirectional multiuser visible light communications in smart home technologies

    Science.gov (United States)

    Tiwari, Samrat Vikramaditya; Sewaiwar, Atul; Chung, Yeon-Ho

    2015-10-01

    In optical wireless communications, multiple channel transmission is an attractive solution to enhancing capacity and system performance. A new modulation scheme called color coded multiple access (CCMA) for bidirectional multiuser visible light communications (VLC) is presented for smart home applications. The proposed scheme uses red, green and blue (RGB) light emitting diodes (LED) for downlink and phosphor based white LED (P-LED) for uplink to establish a bidirectional VLC and also employs orthogonal codes to support multiple users and devices. The downlink transmission for data user devices and smart home devices is provided using red and green colors from the RGB LEDs, respectively, while uplink transmission from both types of devices is performed using the blue color from P-LEDs. Simulations are conducted to verify the performance of the proposed scheme. It is found that the proposed bidirectional multiuser scheme is efficient in terms of data rate and performance. In addition, since the proposed scheme uses RGB signals for downlink data transmission, it provides flicker-free illumination that would lend itself to multiuser VLC system for smart home applications.

  5. On the High Altitude Platform (HAP W-CDMA System Capacity

    Directory of Open Access Journals (Sweden)

    L. de Haro-Ariet

    2004-06-01

    Full Text Available The performance of a downlink power control model, based on a n-thpower distance law, is evaluated for high altitude platform station(HAPS W-CDMA systems. The downlink capacity using this model iscompared with the uplink capacity. It is shown that the uplink capacityis higher than the downlink capacity.

  6. Robust MOE Detector for DS-CDMA Systems with Signature Waveform Mismatch

    Science.gov (United States)

    Lin, Tsui-Tsai

    In this letter, a decision-directed MOE detector with excellent robustness against signature waveform mismatch is proposed for DS-CDMA systems. Both the theoretic analysis and computer simulation results demonstrate that the proposed detector can provide better SINR performance than that of conventional detectors.

  7. Adaptive Multiuser Detectors for DS-CDMA Systems

    Directory of Open Access Journals (Sweden)

    Paul Jean Etienne Jeszensky

    2006-02-01

    Full Text Available This work makes a review of the main Adaptives Multi-user Detectors (MuD-Adpt for Direct Sequence - Code Division Multiple Access (DS-CDMA systems. The MuD-Adpt based on Minimum Mean Square Error (MMSE and Decorrelator (MuD-Dec are focused. Multi-user detectors show great resistance to the near-far effect and combat effectively the Multiple Access Interference (MAI. Comparative numeric results characterize the substantial performance improvement of those detectors in relation to the matched filter conventional receiver (Conv.

  8. Cross-Layer Resource Allocation for Variable Bit Rate Multiclass Services in a Multirate Multicarrier DS-CDMA Network

    Directory of Open Access Journals (Sweden)

    Kee-Chaing Chua

    2005-02-01

    Full Text Available An approximate analytical formulation of the resource allocation problem for handling variable bit rate multiclass services in a cellular round-robin carrier-hopping multirate multicarrier direct-sequence code-division multiple-access (MC-DS-CDMA system is presented. In this paper, all grade-of-service (GoS or quality-of-service (QoS requirements at the connection level, packet level, and link layer are satisfied simultaneously in the system, instead of being satisfied at the connection level or at the link layer only. The analytical formulation shows how the GoS/QoS in the different layers are intertwined across the layers. A novelty of this paper is that the outages in the subcarriers are minimized by spreading the subcarriers' signal-to-interference ratio evenly among all the subcarriers by using a dynamic round-robin carrier-hopping allocation scheme. A complete sharing (CS scheme with guard capacity is used for the resource sharing policy at the connection level based on the mean rates of the connections. Numerical results illustrate that significant gain in the system utilization is achieved through the joint coupling of connection/packet levels and link layer.

  9. Modeling and Analysis of Hybrid Cellular/WLAN Systems with Integrated Service-Based Vertical Handoff Schemes

    Science.gov (United States)

    Xia, Weiwei; Shen, Lianfeng

    We propose two vertical handoff schemes for cellular network and wireless local area network (WLAN) integration: integrated service-based handoff (ISH) and integrated service-based handoff with queue capabilities (ISHQ). Compared with existing handoff schemes in integrated cellular/WLAN networks, the proposed schemes consider a more comprehensive set of system characteristics such as different features of voice and data services, dynamic information about the admitted calls, user mobility and vertical handoffs in two directions. The code division multiple access (CDMA) cellular network and IEEE 802.11e WLAN are taken into account in the proposed schemes. We model the integrated networks by using multi-dimensional Markov chains and the major performance measures are derived for voice and data services. The important system parameters such as thresholds to prioritize handoff voice calls and queue sizes are optimized. Numerical results demonstrate that the proposed ISHQ scheme can maximize the utilization of overall bandwidth resources with the best quality of service (QoS) provisioning for voice and data services.

  10. Delay Estimation in Long-Code Asynchronous DS/CDMA Systems Using Multiple Antennas

    Directory of Open Access Journals (Sweden)

    Sirbu Marius

    2004-01-01

    Full Text Available The problem of propagation delay estimation in asynchronous long-code DS-CDMA multiuser systems is addressed. Almost all the methods proposed so far in the literature for propagation delay estimation are derived for short codes and the knowledge of the codes is exploited by the estimators. In long-code CDMA, the spreading code is aperiodic and the methods developed for short codes may not be used or may increase the complexity significantly. For example, in the subspace-based estimators, the aperiodic nature of the code may require subspace tracking. In this paper we propose a novel method for simultaneous estimation of the propagation delays of several active users. A specific multiple-input multiple-output (MIMO system model is constructed in a multiuser scenario. In such model the channel matrix contains information about both the users propagation delays and channel impulse responses. Consequently, estimates of the delays are obtained as a by-product of the channel estimation task. The channel matrix has a special structure that is exploited in estimating the delays. The proposed delay estimation method lends itself to an adaptive implementation. Thus, it may be applied to joint channel and delay estimation in uplink DS-CDMA analogously to the method presented by the authors in 2003. The performance of the proposed method is studied in simulation using realistic time-varying channel model and different SNR levels in the face of near-far effects, and using low spreading factor (high data rates.

  11. Comparison of a Ring On-Chip Network and a Code-Division Multiple-Access On-Chip Network

    Directory of Open Access Journals (Sweden)

    Xin Wang

    2007-01-01

    Full Text Available Two network-on-chip (NoC designs are examined and compared in this paper. One design applies a bidirectional ring connection scheme, while the other design applies a code-division multiple-access (CDMA connection scheme. Both of the designs apply globally asynchronous locally synchronous (GALS scheme in order to deal with the issue of transferring data in a multiple-clock-domain environment of an on-chip system. The two NoC designs are compared with each other by their network structures, data transfer principles, network node structures, and their asynchronous designs. Both the synchronous and the asynchronous designs of the two on-chip networks are realized using a hardware-description language (HDL in order to make the entire designs suit the commonly used synchronous design tools and flow. The performance estimation and comparison of the two NoC designs which are based on the HDL realizations are addressed. By comparing the two NoC designs, the advantages and disadvantages of applying direct connection and CDMA connection schemes in an on-chip communication network are discussed.

  12. A Brief Survey of Media Access Control, Data Link Layer, and Protocol Technologies for Lunar Surface Communications

    Science.gov (United States)

    Wallett, Thomas M.

    2009-01-01

    This paper surveys and describes some of the existing media access control and data link layer technologies for possible application in lunar surface communications and the advanced wideband Direct Sequence Code Division Multiple Access (DSCDMA) conceptual systems utilizing phased-array technology that will evolve in the next decade. Time Domain Multiple Access (TDMA) and Code Division Multiple Access (CDMA) are standard Media Access Control (MAC) techniques that can be incorporated into lunar surface communications architectures. Another novel hybrid technique that is recently being developed for use with smart antenna technology combines the advantages of CDMA with those of TDMA. The relatively new and sundry wireless LAN data link layer protocols that are continually under development offer distinct advantages for lunar surface applications over the legacy protocols which are not wireless. Also several communication transport and routing protocols can be chosen with characteristics commensurate with smart antenna systems to provide spacecraft communications for links exhibiting high capacity on the surface of the Moon. The proper choices depend on the specific communication requirements.

  13. On a User-Centric Base Station Cooperation Scheme for Reliable Communications

    DEFF Research Database (Denmark)

    Kim, Dong Min; Thomsen, Henning; Popovski, Petar

    2017-01-01

    In this paper, we describe CoMP2flex, a user-centric base station (BS) cooperation scheme that provides improvements in reliability of both uplink (UL) and downlink (DL) communications of wireless cellular networks. CoMP2flex supports not only cooperation of two BSs with same direction of traffic...

  14. PAPR reduction based on tone reservation scheme for DCO-OFDM indoor visible light communications.

    Science.gov (United States)

    Bai, Jurong; Li, Yong; Yi, Yang; Cheng, Wei; Du, Huimin

    2017-10-02

    High peak-to-average power ratio (PAPR) leads to out-of-band power and in-band distortion in the direct current-biased optical orthogonal frequency division multiplexing (DCO-OFDM) systems. In order to effectively reduce the PAPR with faster convergence and lower complexity, this paper proposes a tone reservation based scheme, which is the combination of the signal-to-clipping noise ratio (SCR) procedure and the least squares approximation (LSA) procedure. In the proposed scheme, the transmitter of the DCO-OFDM indoor visible light communication (VLC) system is designed to transform the PAPR reduced signal into real-valued positive OFDM signal without doubling the transmission bandwidth. Moreover, the communication distance and the light emitting diode (LED) irradiance angle are taking into consideration in the evaluation of the system bit error rate (BER). The PAPR reduction efficiency of the proposed scheme is remarkable for DCO-OFDM indoor VLC systems.

  15. Performance of DS-CDMA systems with optimal hard-decision parallel interference cancellation

    NARCIS (Netherlands)

    Hofstad, van der R.W.; Klok, M.J.

    2003-01-01

    We study a multiuser detection system for code-division multiple access (CDMA). We show that applying multistage hard-decision parallel interference cancellation (HD-PIC) significantly improves performance compared to the matched filter system. In (multistage) HD-PIC, estimates of the interfering

  16. FIR Filter of DS-CDMA UWB Modem Transmitter

    Science.gov (United States)

    Kang, Kyu-Min; Cho, Sang-In; Won, Hui-Chul; Choi, Sang-Sung

    This letter presents low-complexity digital pulse shaping filter structures of a direct sequence code division multiple access (DS-CDMA) ultra wide-band (UWB) modem transmitter with a ternary spreading code. The proposed finite impulse response (FIR) filter structures using a look-up table (LUT) have the effect of saving the amount of memory by about 50% to 80% in comparison to the conventional FIR filter structures, and consequently are suitable for a high-speed parallel data process.

  17. Islamic State’s English-language Magazines, 2014-2017: Trends & Implications for CT-CVE Strategic Communications

    Directory of Open Access Journals (Sweden)

    Haroro J. Ingram

    2018-03-01

    Full Text Available Islamic State (IS has used English-language magazines as a crucial component of its propaganda strategy, particularly targeting Muslims living in the West. This paper provides a quick reference guide to IS’s English-language magazines released between June 2014 and September 2017 examining key themes and propaganda strategies deployed across three issues of Islamic State News, four issues of Islamic State Report, fifteen issues of Dabiq and thirteen issues of Rumiyah. It concludes by highlighting four trends and their implications for CT-CVE strategic communications practitioners. First, IS use a mix of rational- and identity-choice appeals to provide its various target audiences with a ‘competitive system of meaning’ which CT-CVE strategic communication efforts must seek to dismantle with careful campaign and message design. Second, over the period of 2014-17 IS appears to have deployed a thematic ‘hedging’ strategy characterised by certain messaging themes being prioritised over others during periods of boom versus bust. By identifying the signatures of IS’s use of propaganda ‘hedging’, CT-CVE practitioners can be better prepared to confront current and future challenges from IS propagandists. Third, IS’s English-language magazines must be understood within the context of trends across its broader propaganda effort. To effectively address this multifaceted threat, CT-CVE practitioners would benefit from applying the KISMI (Keep It Simple Maximise Impact principle of rolling-out a strategic communications campaign. Finally, the appearance of instructional material in IS propaganda highlights the need for post-incident CT-CVE strategic communication plans to undermine the strategic logic of so-called “inspired” attacks.

  18. Early experience with a picture archiving and communication system for X-ray CT

    International Nuclear Information System (INIS)

    Nakano, Y.; Komori, M.; Minato, K.

    1987-01-01

    A network using fiberoptic ring architecture has been implemented to connect an x-ray CT unit with an image work station and optical disk storage unit. The work station has three noninterlaced cathode-ray tube (CRT) monitors of 1,024 X 1,024 pixels. The optical disk system stores 32 optical disk cartridges (2.6 Gbytes per cartridge). A general-purpose interface bus is used for communication between the CT unit and the network interface unit. Transfer time from CT to interface unit is 40 kbyte/second, 5 seconds per image. On-line data acquisition, long-term archiving, and CT interpretation using CRTs have been tested and the system has been working for 3 months in a clinical environment

  19. 2-Step Maximum Likelihood Channel Estimation for Multicode DS-CDMA with Frequency-Domain Equalization

    Science.gov (United States)

    Kojima, Yohei; Takeda, Kazuaki; Adachi, Fumiyuki

    Frequency-domain equalization (FDE) based on the minimum mean square error (MMSE) criterion can provide better downlink bit error rate (BER) performance of direct sequence code division multiple access (DS-CDMA) than the conventional rake combining in a frequency-selective fading channel. FDE requires accurate channel estimation. In this paper, we propose a new 2-step maximum likelihood channel estimation (MLCE) for DS-CDMA with FDE in a very slow frequency-selective fading environment. The 1st step uses the conventional pilot-assisted MMSE-CE and the 2nd step carries out the MLCE using decision feedback from the 1st step. The BER performance improvement achieved by 2-step MLCE over pilot assisted MMSE-CE is confirmed by computer simulation.

  20. A new communication scheme for the neutron diffusion nodal method in a distributed computing environment

    International Nuclear Information System (INIS)

    Kirk, B.L.; Azmy, Y.

    1994-01-01

    A modified scheme is developed for solving the two-dimensional nodal diffusion equations on distributed memory computers. The scheme is aimed at minimizing the volume of communication among processors while maximizing the tasks in parallel. Results show a significant improvement in parallel efficiency on the Intel iPSC/860 hypercube compared to previous algorithms

  1. Design of a search and rescue terminal based on the dual-mode satellite and CDMA network

    Science.gov (United States)

    Zhao, Junping; Zhang, Xuan; Zheng, Bing; Zhou, Yubin; Song, Hao; Song, Wei; Zhang, Meikui; Liu, Tongze; Zhou, Li

    2010-12-01

    The current goal is to create a set of portable terminals with GPS/BD2 dual-mode satellite positioning, vital signs monitoring and wireless transmission functions. The terminal depends on an ARM processor to collect and combine data related to vital signs and GPS/BD2 location information, and sends the message to headquarters through the military CDMA network. It integrates multiple functions as a whole. The satellite positioning and wireless transmission capabilities are integrated into the motherboard, and the vital signs sensors used in the form of belts communicate with the board through Bluetooth. It can be adjusted according to the headquarters' instructions. This kind of device is of great practical significance for operations during disaster relief, search and rescue of the wounded in wartime, non-war military operations and other special circumstances.

  2. Dynamic Resource Management in MC-CDMA Based Cellular Wireless Networks

    Directory of Open Access Journals (Sweden)

    Bala Jeevitha Vani

    2009-10-01

    Full Text Available Most of the multimedia and Internet services today are asymmetric in nature, and require high data rate support. Allocating equal band width in both uplink and downlink is not prudent solution, as most of the time user requirement is more either in uplink or downlink. The Multi Carrier Code Division Multiple Access (MC-CDMA system with time division duplex mode can easily met this requirement by dynamically declaring traffic direction in TDD slot, and adaptively allocating the sub channels. In this paper, we propose a adaptive slot and sub carrier allocation algorithm, that can be independently implemented in each cell of mobile communication network. Our analytical model is generalization of two cell concept to represent a multi cell model. Based on two cell concept four cases of interference pattern has been considered and simulated separately in presence of Additive White Gaussian Noise (AWGN and Rayleigh Channel. The simulated result suggests the requirement of approximately 9dB of Signal to Noise Ratio (SNR to maintain Bit Error Rate below 10-3. We also analyze the average delay incurred by the proposed algorithm in allocating resources.

  3. High performance mixed optical CDMA system using ZCC code and multiband OFDM

    Directory of Open Access Journals (Sweden)

    Nawawi N. M.

    2017-01-01

    Full Text Available In this paper, we have proposed a high performance network design, which is based on mixed optical Code Division Multiple Access (CDMA system using Zero Cross Correlation (ZCC code and multiband Orthogonal Frequency Division Multiplexing (OFDM called catenated OFDM. In addition, we also investigate the related changing parameters such as; effective power, number of user, number of band, code length and code weight. Then we theoretically analyzed the system performance comprehensively while considering up to five OFDM bands. The feasibility of the proposed system architecture is verified via the numerical analysis. The research results demonstrated that our developed modulation solution can significantly enhanced the total number of user; improving up to 80% for five catenated bands compared to traditional optical CDMA system, with the code length equals to 80, transmitted at 622 Mbps. It is also demonstrated that the BER performance strongly depends on number of weight, especially with less number of users. As the number of weight increases, the BER performance is better.

  4. High performance mixed optical CDMA system using ZCC code and multiband OFDM

    Science.gov (United States)

    Nawawi, N. M.; Anuar, M. S.; Junita, M. N.; Rashidi, C. B. M.

    2017-11-01

    In this paper, we have proposed a high performance network design, which is based on mixed optical Code Division Multiple Access (CDMA) system using Zero Cross Correlation (ZCC) code and multiband Orthogonal Frequency Division Multiplexing (OFDM) called catenated OFDM. In addition, we also investigate the related changing parameters such as; effective power, number of user, number of band, code length and code weight. Then we theoretically analyzed the system performance comprehensively while considering up to five OFDM bands. The feasibility of the proposed system architecture is verified via the numerical analysis. The research results demonstrated that our developed modulation solution can significantly enhanced the total number of user; improving up to 80% for five catenated bands compared to traditional optical CDMA system, with the code length equals to 80, transmitted at 622 Mbps. It is also demonstrated that the BER performance strongly depends on number of weight, especially with less number of users. As the number of weight increases, the BER performance is better.

  5. Message formulation, organization, and navigation schemes for icon-based communication aids.

    Science.gov (United States)

    Patel, Rupal

    2011-01-01

    Individuals with severe speech and motor impairments rely on assistive communication devices to convey their needs and desires in social, educational, and vocational situations. Users with limited motor control or literacy often choose to use icon-based devices that afford increased speed of message formulation at the cost of fully generative language formulation on letter-based devices. A major challenge with large vocabulary icon-based systems is rate of communication. Message formulation, vocabulary organization, and navigation schemes can be used to mitigate the trade-off between vocabulary size and communication rate. This paper summarizes our research efforts to leverage semantic frame theory, situational context, and rapid serial visual presentation to improve message formulation speed and completeness in our iconCHAT and RSVP iconCHAT systems. Usability data and persisting challenges are discussed.

  6. Multirate IP traffic transmission in flexible access networks based on optical FFH-CDMA

    DEFF Research Database (Denmark)

    Raddo, Thiago R.; Sanches, Anderson L.; Tafur Monroy, Idelfonso

    2016-01-01

    In this paper, we propose a new IP transmission architecture over optical fast frequency hopping code-division multiple-access (OFFH-CDMA) network capable of supporting multirate transmissions for applications in flexible optical access networks. The proposed network architecture is independent...

  7. A secure communication scheme based generalized function projective synchronization of a new 5D hyperchaotic system

    International Nuclear Information System (INIS)

    Wu, Xiangjun; Fu, Zhengye; Kurths, Jürgen

    2015-01-01

    In this paper, a new five-dimensional hyperchaotic system is proposed based on the Lü hyperchaotic system. Some of its basic dynamical properties, such as equilibria, Lyapunov exponents, bifurcations and various attractors are investigated. Furthermore, a new secure communication scheme based on generalized function projective synchronization (GFPS) of this hyperchaotic system with an uncertain parameter is presented. The communication scheme is composed of the modulation, the chaotic receiver, the chaotic transmitter and the demodulation. The modulation mechanism is to modulate the message signal into the system parameter. Then the chaotic signals are sent to the receiver via a public channel. In the receiver end, by designing the controllers and the parameter update rule, GFPS between the transmitter and receiver systems is achieved and the unknown parameter is estimated simultaneously. The message signal can be finally recovered by the identified parameter and the corresponding demodulation method. There is no any limitation on the message size. Numerical simulations are performed to show the validity and feasibility of the presented secure communication scheme. (paper)

  8. An adaptive chaos synchronization scheme applied to secure communication

    International Nuclear Information System (INIS)

    Feki, Moez

    2003-01-01

    This paper deals with the problem of synchronization of a class of continuous-time chaotic systems using the drive-response concept. An adaptive observer-based response system is designed to synchronize with a given chaotic drive system whose dynamical model is subjected to unknown parameters. Using the Lyapunov stability theory an adaptation law is derived to estimate the unknown parameters. We show that synchronization is achieved asymptotically. The approach is next applied to chaos-based secure communication. To demonstrate the efficiency of the proposed scheme numerical simulations are presented

  9. ANALISIS PERILAKU KONSUMEN DALAM MEMILIH JASA LAYANAN OPERATOR MOBILE PHONE YANG BERBASIS CDMA DAN GSM

    Directory of Open Access Journals (Sweden)

    Demitri Marvin Kadhaffi

    2012-05-01

    Full Text Available ABSTRAKS Tujuan penelitian ini adalah (1 menganalisis faktor-faktor yang dipertimbangkan konsumen dalam memilih suatu jasa layanan operator mobile phone (baik CDMA maupun GSM, (2 menganalsis variabel dominan yang mempengaruhi perilaku konsumen dalam memilih jasa layanan operator Jenis penelitian ini adalah applied research dengan metode penelitian studi kausal. Penelitian ini ditujukan pada segmen pelajar dan mahasiswa di Kota Malang yang termasuk kelompok Net Generations (yang lahir antara tahun 1977-1997 dengan batas minimal umur untuk responden adalah 17 tahun.  Kerangka Sampel untuk penelitian ini adalah pengguna kartu CDMA dan GSM sebanyak 175 responden. Tehnik Sampling yang digunakan adalah desain sampel non probability dengan metode purposive sample yang kedua yaitu quota sampling. Metode analisa data yang digunakan adalah analisa faktor dan analisa diskriminan Hasil analisa faktor terhadap 34 variabel diperoleh  7 faktor baru, yang diberi label sebagai berikut : (1 faktor citra produk (2 faktor pelayanan, (3 faktor pengaruh lingkungan, (4 faktor promosi,(5 faktor individual, (6 faktor harga, dan (7 faktor proses. Dari analisa diskriminan diperoleh hasil yang bertentangan dengan hipotesis yaitu ternyata variabel harga bukan merupakan variabel yang dominan dalam membedakan perilaku pelanggan operator CDMA dengan GSM. Mereka lebih sensitif terhadap proses produk. Hal ini mengarahkan pelanggan untuk kalangan pelajar dan mahasiswa sebagai kelompok smart. Hasil penelitian menyimpulkan bahwa untuk membangun keunggulan bersaing operator harus meraih keunggulan posisional melalui diferensiasi “content” jasa yang dihasilkan yaitu berupa proses, sebagai hasil dari aplikasi  positioning produk.   Kata kunci: perilaku konsumen, jasa layanan, mobile phone   ABSTRACT Objective of this research are (1 to identify factors that customer consider in choosing mobile phone operator service (whether CDMA and GSM, (2 to identify dominant variable that

  10. Efficient Smart Antenna Systems (4G) For CDMA Wireless Communication

    OpenAIRE

    Singla, Brahm Mohinder; Kumar, Ashish

    2012-01-01

    Today, mobile communications play a central role in the voice/data network arena. With the deployment of mass scale 3G just around the corner, new directions are already being researched. In this paper we address about the 4TH G mobile communications.The Fourth Generation (4G) Mobile Communications should not focus only on the data-rate increase and new air interface.4G Mobile should instead con-verge the advanced wireless mobile communications and high-speed wireless access systems into an O...

  11. Evaluation of three coding schemes designed for improved data communication

    Science.gov (United States)

    Snelsire, R. W.

    1974-01-01

    Three coding schemes designed for improved data communication are evaluated. Four block codes are evaluated relative to a quality function, which is a function of both the amount of data rejected and the error rate. The Viterbi maximum likelihood decoding algorithm as a decoding procedure is reviewed. This evaluation is obtained by simulating the system on a digital computer. Short constraint length rate 1/2 quick-look codes are studied, and their performance is compared to general nonsystematic codes.

  12. Effects of simultaneous combined exposure to CDMA and WCDMA electromagnetic fields on serum hormone levels in rats

    International Nuclear Information System (INIS)

    Jin, Yeung Bae; Choi, Hyung-Do; Kim, Byung Chan; Pack, Jeong-Ki; Kim, Nam; Lee, Yun-Sil

    2013-01-01

    Despite more than a decade of research on the endocrine system, there have been no published studies about the effects of concurrent exposure of radiofrequency electromagnetic fields (RF-EMF) on this system. The present study investigated the several parameters of the endocrine system including melatonin, thyroid stimulating hormone, stress hormone and sex hormone after code division multiple access (CDMA, 849 MHz) and wideband code division multiple access (WCDMA, 1.95 GHz) signals for simultaneous exposure in rats. Sprague-Dawley rats were exposed to RF-EMF signals for 45 min/day, 5 days/week for up to 8 weeks. The whole-body average specific absorption rate (SAR) of CDMA or WCDMA was 2.0 W/kg (total 4.0 W/kg). At 4 and 8 weeks after the experiment began, each experimental group's 40 rats (male 20, female 20) were autopsied. Exposure for 8 weeks to simultaneous CDMA and WCDMA RF did not affect serum levels in rats of melatonin, thyroid stimulating hormone (TSH), triiodothyronine (T3) and thyroxin (T4), adrenocorticotropic hormone (ACTH) and sex hormones (testosterone and estrogen) as assessed by the ELISA method

  13. An accurate evaluation of the performance of asynchronous DS-CDMA systems with zero-correlation-zone coding in Rayleigh fading

    Science.gov (United States)

    Walker, Ernest; Chen, Xinjia; Cooper, Reginald L.

    2010-04-01

    An arbitrarily accurate approach is used to determine the bit-error rate (BER) performance for generalized asynchronous DS-CDMA systems, in Gaussian noise with Raleigh fading. In this paper, and the sequel, new theoretical work has been contributed which substantially enhances existing performance analysis formulations. Major contributions include: substantial computational complexity reduction, including a priori BER accuracy bounding; an analytical approach that facilitates performance evaluation for systems with arbitrary spectral spreading distributions, with non-uniform transmission delay distributions. Using prior results, augmented by these enhancements, a generalized DS-CDMA system model is constructed and used to evaluated the BER performance, in a variety of scenarios. In this paper, the generalized system modeling was used to evaluate the performance of both Walsh- Hadamard (WH) and Walsh-Hadamard-seeded zero-correlation-zone (WH-ZCZ) coding. The selection of these codes was informed by the observation that WH codes contain N spectral spreading values (0 to N - 1), one for each code sequence; while WH-ZCZ codes contain only two spectral spreading values (N/2 - 1,N/2); where N is the sequence length in chips. Since these codes span the spectral spreading range for DS-CDMA coding, by invoking an induction argument, the generalization of the system model is sufficiently supported. The results in this paper, and the sequel, support the claim that an arbitrary accurate performance analysis for DS-CDMA systems can be evaluated over the full range of binary coding, with minimal computational complexity.

  14. Load control strategies in 2G mobile network for W-CDMA radio ...

    African Journals Online (AJOL)

    Network planning requires a faithful analysis of each individual cell's capacity. In this paper, we examine load control equations as a resource allocation tool to analyse cell capacity for the uplink and downlink of Wideband Code Division Multiple Access (W-CDMA) networks. In the uplink, the noise rise is a parameter of ...

  15. Performance Analysis of a De-correlated Modified Code Tracking Loop for Synchronous DS-CDMA System under Multiuser Environment

    Science.gov (United States)

    Wu, Ya-Ting; Wong, Wai-Ki; Leung, Shu-Hung; Zhu, Yue-Sheng

    This paper presents the performance analysis of a De-correlated Modified Code Tracking Loop (D-MCTL) for synchronous direct-sequence code-division multiple-access (DS-CDMA) systems under multiuser environment. Previous studies have shown that the imbalance of multiple access interference (MAI) in the time lead and time lag portions of the signal causes tracking bias or instability problem in the traditional correlating tracking loop like delay lock loop (DLL) or modified code tracking loop (MCTL). In this paper, we exploit the de-correlating technique to combat the MAI at the on-time code position of the MCTL. Unlike applying the same technique to DLL which requires an extensive search algorithm to compensate the noise imbalance which may introduce small tracking bias under low signal-to-noise ratio (SNR), the proposed D-MCTL has much lower computational complexity and exhibits zero tracking bias for the whole range of SNR, regardless of the number of interfering users. Furthermore, performance analysis and simulations based on Gold codes show that the proposed scheme has better mean square tracking error, mean-time-to-lose-lock and near-far resistance than the other tracking schemes, including traditional DLL (T-DLL), traditional MCTL (T-MCTL) and modified de-correlated DLL (MD-DLL).

  16. Smart LED allocation scheme for efficient multiuser visible light communication networks.

    Science.gov (United States)

    Sewaiwar, Atul; Tiwari, Samrat Vikramaditya; Chung, Yeon Ho

    2015-05-18

    In a multiuser bidirectional visible light communication (VLC), a large number of LEDs or an LED array needs to be allocated in an efficient manner to ensure sustainable data rate and link quality. Moreover, in order to support an increasing or decreasing number of users in the network, the LED allocation is required to be performed dynamically. In this paper, a novel smart LED allocation scheme for efficient multiuser VLC networks is presented. The proposed scheme allocates RGB LEDs to multiple users in a dynamic and efficient fashion, while satisfying illumination requirements in an indoor environment. The smart LED array comprised of RGB LEDs is divided into sectors according to the location of the users. The allocated sectors then provide optical power concentration toward the users for efficient and reliable data transmission. An algorithm for the dynamic allocation of the LEDs is also presented. To verify its effective resource allocation feature of the proposed scheme, simulations were performed. It is found that the proposed smart LED allocation scheme provides the effect of optical beamforming toward individual users, thereby increasing the collective power concentration of the optical signals on the desirable users and resulting in significantly increased data rate, while ensuring sufficient illumination in a multiuser VLC environment.

  17. A Novel Method of SIR Measurement for Power Control in CDMA Systems

    International Nuclear Information System (INIS)

    Yu, J; Wu, S B; He, J Z

    2006-01-01

    CDMA is interference limited multiple access system. Power control is an effective way to reduce co-channel interference and solve the near-far problem. Consequently, it can improve the system capacity, and make higher data rate possible. CDMA2000 employs fast closed-loop power control in reverse link to combat channel fading, and the estimation of signal to interference ratio (SIR) is required for closed-loop power control. Transmitting power is adjusted by comparing the SIR estimation with SIR target. So, it is crucial to measure the SIR of received signal accurately. Traditional measurement methods mostly depend on pilot signal strongly, when the pilots are few, there is a greater error brought to the measurement of SIR. In this paper, we discuss the SIR measurement of the received signal under the fewer pilots condition (especially only one pilot symbol) and present a novel SIR measurement method. According to the simulation, the numerical results indicate that the SIR measured by the proposed method is more accurate than the SIR measured by conventional method under fewer pilots condition

  18. Optimal power allocation and joint source-channel coding for wireless DS-CDMA visual sensor networks

    Science.gov (United States)

    Pandremmenou, Katerina; Kondi, Lisimachos P.; Parsopoulos, Konstantinos E.

    2011-01-01

    In this paper, we propose a scheme for the optimal allocation of power, source coding rate, and channel coding rate for each of the nodes of a wireless Direct Sequence Code Division Multiple Access (DS-CDMA) visual sensor network. The optimization is quality-driven, i.e. the received quality of the video that is transmitted by the nodes is optimized. The scheme takes into account the fact that the sensor nodes may be imaging scenes with varying levels of motion. Nodes that image low-motion scenes will require a lower source coding rate, so they will be able to allocate a greater portion of the total available bit rate to channel coding. Stronger channel coding will mean that such nodes will be able to transmit at lower power. This will both increase battery life and reduce interference to other nodes. Two optimization criteria are considered. One that minimizes the average video distortion of the nodes and one that minimizes the maximum distortion among the nodes. The transmission powers are allowed to take continuous values, whereas the source and channel coding rates can assume only discrete values. Thus, the resulting optimization problem lies in the field of mixed-integer optimization tasks and is solved using Particle Swarm Optimization. Our experimental results show the importance of considering the characteristics of the video sequences when determining the transmission power, source coding rate and channel coding rate for the nodes of the visual sensor network.

  19. Dynamic Resource Allocation and Access Class Barring Scheme for Delay-Sensitive Devices in Machine to Machine (M2M) Communications.

    Science.gov (United States)

    Li, Ning; Cao, Chao; Wang, Cong

    2017-06-15

    Supporting simultaneous access of machine-type devices is a critical challenge in machine-to-machine (M2M) communications. In this paper, we propose an optimal scheme to dynamically adjust the Access Class Barring (ACB) factor and the number of random access channel (RACH) resources for clustered machine-to-machine (M2M) communications, in which Delay-Sensitive (DS) devices coexist with Delay-Tolerant (DT) ones. In M2M communications, since delay-sensitive devices share random access resources with delay-tolerant devices, reducing the resources consumed by delay-sensitive devices means that there will be more resources available to delay-tolerant ones. Our goal is to optimize the random access scheme, which can not only satisfy the requirements of delay-sensitive devices, but also take the communication quality of delay-tolerant ones into consideration. We discuss this problem from the perspective of delay-sensitive services by adjusting the resource allocation and ACB scheme for these devices dynamically. Simulation results show that our proposed scheme realizes good performance in satisfying the delay-sensitive services as well as increasing the utilization rate of the random access resources allocated to them.

  20. An analytical model for CDMA downlink rate optimization taking into account uplink coverage restriction

    NARCIS (Netherlands)

    Endrayanto, A.I.; van den Berg, Hans Leo; Boucherie, Richardus J.

    2003-01-01

    This paper models and analyzes downlink and uplink power assignment in Code Division Multiple Access (CDMA) mobile networks. By discretizing the area into small segments, the power requirements are characterized via a matrix representation that separates user and system characteristics. We obtain a

  1. An analytical model for CDMA downlink rate optimization taking into account uplink coverage restrictions

    NARCIS (Netherlands)

    Endrayanto, A.I.; van den Berg, Hans Leo; Boucherie, Richardus J.

    2005-01-01

    This paper models and analyzes downlink and uplink power assignment in code division multiple access (CDMA) mobile networks. By discretizing the area into small segments, the power requirements are characterized via a matrix representation that separates user and system characteristics. We obtain a

  2. Neurological abnormalities associated with CDMA exposure.

    Science.gov (United States)

    Hocking, B; Westerman, R

    2001-09-01

    Dysaesthesiae of the scalp and neurological abnormality after mobile phone use have been reported previously, but the roles of the phone per se or the radiations in causing these findings have been questioned. We report finding a neurological abnormality in a patient after accidental exposure of the left side of the face to mobile phone radiation [code division multiple access (CDMA)] from a down-powered mobile phone base station antenna. He had headaches, unilateral left blurred vision and pupil constriction, unilateral altered sensation on the forehead, and abnormalities of current perception thresholds on testing the left trigeminal ophthalmic nerve. His nerve function recovered during 6 months follow-up. His exposure was 0.015-0.06 mW/cm(2) over 1-2 h. The implications regarding health effects of radiofrequency radiation are discussed.

  3. DS-CDMA Receiver Based on a Five-Port Technology

    Directory of Open Access Journals (Sweden)

    Elvino S. Sousa

    2005-07-01

    Full Text Available High data rates, low-power consumption, and low complexity will be the most important parameters in the design of the next-generation mobile terminals. In this paper we are introducing a new paradigm in the design of direct sequence spread spectrum receiver by combining analog and digital signal processing. The main difference with respect to the conventional all-digital receiver design approach is that the proposed mixed analog/digital processing results in a symbol rate sampling rather than the high-rate subchip sampling. Analog signal despreading is the key part of the proposed receiver solution, which is based on a five-port device, a passive RF square-law-type device. It is used to perform two important tasks at the same time, namely, the direct conversion and analog despreading. To achieve lower complexity, the proposed receiver uses rectangular instead of pulse-matched despreading at the cost of only a small performance degradation. Also, we propose a new noncoherent pseudonoise (PN code tracking scheme based on error signal generated through the L1 norm. This results in comparable or even better PN code tracking performance than L2 norm circuitry, using less complex hardware. Further, we explore how this technology can be applied in the design of DS-CDMA RAKE receiver for mobile terminals. Depending on how the pilot signal is multiplexed, we propose two types of RAKE receivers. It is shown that under Rayleigh fading channel such receiver structures offer robustness and high performance, while maintaining the low complexity achievable through the five-port device.

  4. The communication of the radiation risk from CT in relation to its clinical benefit in the era of personalized medicine. Pt. 2. Benefits versus risk of CT

    International Nuclear Information System (INIS)

    Westra, Sjirk J.

    2014-01-01

    In order to personalize the communication of the CT risk, we need to describe the risk in the context of the clinical benefit of CT, which will generally be much higher, provided a CT scan has a well-established clinical indication. However as pediatric radiologists we should be careful not to overstate the benefit of CT, being aware that medico-legal pressures and the realities of health care economics have led to overutilization of the technology. And even though we should not use previously accumulated radiation dose to a child as an argument against conducting a clinically indicated scan (the ''sunk-cost'' bias), we should consider patients' radiation history in the diagnostic decision process. As a contribution to future public health, it makes more sense to look for non-radiating alternatives to CT in the much larger group of basically healthy children who are receiving occasional scans for widely prevalent conditions such as appendicitis and trauma than to attempt lowering CT use in the smaller group of patients with chronic conditions with a limited life expectancy. When communicating the CT risk with individual patients and their parents, we should acknowledge and address their concerns within the framework of informed decision-making. When appropriate, we may express the individual radiation risk, based on estimates of summated absorbed organ dose, as an order of magnitude rather than as an absolute number, and compare this with the much larger natural cancer incidence over a child's lifetime, and with other risks in medicine and daily life. We should anticipate that many patients cannot make informed decisions on their own in this complex matter, and we should offer our guidance while maintaining respect for patient autonomy. Proper documentation of the informed decision process is important for future reference. In concert with our referring physicians, pediatric radiologists are well-equipped to tackle the complexities associated with the communication

  5. Modeling and performance analysis of an improved movement-based location management scheme for packet-switched mobile communication systems.

    Science.gov (United States)

    Chung, Yun Won; Kwon, Jae Kyun; Park, Suwon

    2014-01-01

    One of the key technologies to support mobility of mobile station (MS) in mobile communication systems is location management which consists of location update and paging. In this paper, an improved movement-based location management scheme with two movement thresholds is proposed, considering bursty data traffic characteristics of packet-switched (PS) services. The analytical modeling for location update and paging signaling loads of the proposed scheme is developed thoroughly and the performance of the proposed scheme is compared with that of the conventional scheme. We show that the proposed scheme outperforms the conventional scheme in terms of total signaling load with an appropriate selection of movement thresholds.

  6. Sensitivity of Multicarrier Two-Dimensional Spreading Schemes to Synchronization Errors

    Directory of Open Access Journals (Sweden)

    Geneviève Jourdain

    2008-06-01

    Full Text Available This paper presents the impact of synchronization errors on the performance of a downlink multicarrier two-dimensional spreading OFDM-CDMA system. This impact is measured by the degradation of the signal to interference and noise ratio (SINR obtained after despreading and equalization. The contribution of this paper is twofold. First, we use some properties of random matrix and free probability theories to derive a new expression of the SINR. This expression is then independent of the actual value of the spreading codes while still accounting for the orthogonality between codes. This model is validated by means of Monte Carlo simulations. Secondly, the model is exploited to derive the SINR degradation of OFDM-CDMA systems due to synchronization errors which include a timing error, a carrier frequency offset, and a sampling frequency offset. It is also exploited to compare the sensitivities of MC-CDMA and MC-DS-CDMA systems to these errors in a frequency selective channel. This work is carried out for zero-forcing and minimum mean square error equalizers.

  7. Successive Interference Cancellation for DS-CDMA Systems with Transmit Diversity

    Directory of Open Access Journals (Sweden)

    Li Wei

    2004-01-01

    Full Text Available We introduce a new successive interference cancellation (SIC technique for direct sequence code division multiple access (DS-CDMA systems with transmit diversity. The transmit diversity is achieved with a space-time block code (STBC. In our work we first consider hard decision SIC with an STBC, and then investigate the performance of soft decision SIC with an STBC. System performance over a Rayleigh fading channel is investigated and the analysis is confirmed by simulation.

  8. Indoor high precision three-dimensional positioning system based on visible light communication using modified genetic algorithm

    Science.gov (United States)

    Chen, Hao; Guan, Weipeng; Li, Simin; Wu, Yuxiang

    2018-04-01

    To improve the precision of indoor positioning and actualize three-dimensional positioning, a reversed indoor positioning system based on visible light communication (VLC) using genetic algorithm (GA) is proposed. In order to solve the problem of interference between signal sources, CDMA modulation is used. Each light-emitting diode (LED) in the system broadcasts a unique identity (ID) code using CDMA modulation. Receiver receives mixed signal from every LED reference point, by the orthogonality of spreading code in CDMA modulation, ID information and intensity attenuation information from every LED can be obtained. According to positioning principle of received signal strength (RSS), the coordinate of the receiver can be determined. Due to system noise and imperfection of device utilized in the system, distance between receiver and transmitters will deviate from the real value resulting in positioning error. By introducing error correction factors to global parallel search of genetic algorithm, coordinates of the receiver in three-dimensional space can be determined precisely. Both simulation results and experimental results show that in practical application scenarios, the proposed positioning system can realize high precision positioning service.

  9. Efficient demodulation scheme for rolling-shutter-patterning of CMOS image sensor based visible light communications.

    Science.gov (United States)

    Chen, Chia-Wei; Chow, Chi-Wai; Liu, Yang; Yeh, Chien-Hung

    2017-10-02

    Recently even the low-end mobile-phones are equipped with a high-resolution complementary-metal-oxide-semiconductor (CMOS) image sensor. This motivates using a CMOS image sensor for visible light communication (VLC). Here we propose and demonstrate an efficient demodulation scheme to synchronize and demodulate the rolling shutter pattern in image sensor based VLC. The implementation algorithm is discussed. The bit-error-rate (BER) performance and processing latency are evaluated and compared with other thresholding schemes.

  10. A multiple-choice knapsack based algorithm for CDMA downlink rate differentiation under uplink coverage restrictions

    NARCIS (Netherlands)

    Endrayanto, A.I.; Bumb, A.F.; Boucherie, Richardus J.

    2004-01-01

    This paper presents an analytical model for downlink rate allocation in Code Division Multiple Access (CDMA) mobile networks. By discretizing the coverage area into small segments, the transmit power requirements are characterized via a matrix representation that separates user and system

  11. The performance evaluation of a new neural network based traffic management scheme for a satellite communication network

    Science.gov (United States)

    Ansari, Nirwan; Liu, Dequan

    1991-01-01

    A neural-network-based traffic management scheme for a satellite communication network is described. The scheme consists of two levels of management. The front end of the scheme is a derivation of Kohonen's self-organization model to configure maps for the satellite communication network dynamically. The model consists of three stages. The first stage is the pattern recognition task, in which an exemplar map that best meets the current network requirements is selected. The second stage is the analysis of the discrepancy between the chosen exemplar map and the state of the network, and the adaptive modification of the chosen exemplar map to conform closely to the network requirement (input data pattern) by means of Kohonen's self-organization. On the basis of certain performance criteria, whether a new map is generated to replace the original chosen map is decided in the third stage. A state-dependent routing algorithm, which arranges the incoming call to some proper path, is used to make the network more efficient and to lower the call block rate. Simulation results demonstrate that the scheme, which combines self-organization and the state-dependent routing mechanism, provides better performance in terms of call block rate than schemes that only have either the self-organization mechanism or the routing mechanism.

  12. Reduction of the near-far effect in mobile communication systems with Code-Division Multiple-Access

    Science.gov (United States)

    Purchla, Magdalena

    2006-02-01

    In this paper the basic methods for reducing Multiple Access Interference (MAI) and combating the near-far effect in Direct-Sequence Code-Division Multiple-Access (DS-CDMA) mobile communication systems are presented. MAI and the near-far effect are inevitable in DS-CDMA systems with quasi-orthogonal spreading sequences. An effective method of reducing MAI can increase the capacity of the system that is why so many researchers are working in this field. In this article three most important techniques of decreasing MAI are presented: power control, multiuser detection and space-time processing. There is a short introduction to each topic and one or more examples found in literature of algorithms suitable for practical applications (although not all algorithms are yet used in existing systems).

  13. Analysis of Optical CDMA Signal Transmission: Capacity Limits and Simulation Results

    Directory of Open Access Journals (Sweden)

    Lawrence R. Chen

    2005-06-01

    Full Text Available We present performance limits of the optical code-division multiple-access (OCDMA networks. In particular, we evaluate the information-theoretical capacity of the OCDMA transmission when single-user detection (SUD is used by the receiver. First, we model the OCDMA transmission as a discrete memoryless channel, evaluate its capacity when binary modulation is used in the interference-limited (noiseless case, and extend this analysis to the case when additive white Gaussian noise (AWGN is corrupting the received signals. Next, we analyze the benefits of using nonbinary signaling for increasing the throughput of optical CDMA transmission. It turns out that up to a fourfold increase in the network throughput can be achieved with practical numbers of modulation levels in comparison to the traditionally considered binary case. Finally, we present BER simulation results for channel coded binary and M-ary OCDMA transmission systems. In particular, we apply turbo codes concatenated with Reed-Solomon codes so that up to several hundred concurrent optical CDMA users can be supported at low target bit error rates. We observe that unlike conventional OCDMA systems, turbo-empowered OCDMA can allow overloading (more active users than is the length of the spreading sequences with good bit error rate system performance.

  14. Analysis of Optical CDMA Signal Transmission: Capacity Limits and Simulation Results

    Science.gov (United States)

    Garba, Aminata A.; Yim, Raymond M. H.; Bajcsy, Jan; Chen, Lawrence R.

    2005-12-01

    We present performance limits of the optical code-division multiple-access (OCDMA) networks. In particular, we evaluate the information-theoretical capacity of the OCDMA transmission when single-user detection (SUD) is used by the receiver. First, we model the OCDMA transmission as a discrete memoryless channel, evaluate its capacity when binary modulation is used in the interference-limited (noiseless) case, and extend this analysis to the case when additive white Gaussian noise (AWGN) is corrupting the received signals. Next, we analyze the benefits of using nonbinary signaling for increasing the throughput of optical CDMA transmission. It turns out that up to a fourfold increase in the network throughput can be achieved with practical numbers of modulation levels in comparison to the traditionally considered binary case. Finally, we present BER simulation results for channel coded binary and[InlineEquation not available: see fulltext.]-ary OCDMA transmission systems. In particular, we apply turbo codes concatenated with Reed-Solomon codes so that up to several hundred concurrent optical CDMA users can be supported at low target bit error rates. We observe that unlike conventional OCDMA systems, turbo-empowered OCDMA can allow overloading (more active users than is the length of the spreading sequences) with good bit error rate system performance.

  15. Space-Time Chip Equalization for Maximum Diversity Space-Time Block Coded DS-CDMA Downlink Transmission

    NARCIS (Netherlands)

    Leus, G.; Petré, F.; Moonen, M.

    2004-01-01

    In the downlink of DS-CDMA, frequency-selectivity destroys the orthogonality of the user signals and introduces multiuser interference (MUI). Space-time chip equalization is an efficient tool to restore the orthogonality of the user signals and suppress the MUI. Furthermore, multiple-input

  16. The communication of the radiation risk from CT in relation to its clinical benefit in the era of personalized medicine. Pt. 2. Benefits versus risk of CT

    Energy Technology Data Exchange (ETDEWEB)

    Westra, Sjirk J. [Massachusetts General Hospital, Division of Pediatric Radiology, Boston, MA (United States)

    2014-10-15

    In order to personalize the communication of the CT risk, we need to describe the risk in the context of the clinical benefit of CT, which will generally be much higher, provided a CT scan has a well-established clinical indication. However as pediatric radiologists we should be careful not to overstate the benefit of CT, being aware that medico-legal pressures and the realities of health care economics have led to overutilization of the technology. And even though we should not use previously accumulated radiation dose to a child as an argument against conducting a clinically indicated scan (the ''sunk-cost'' bias), we should consider patients' radiation history in the diagnostic decision process. As a contribution to future public health, it makes more sense to look for non-radiating alternatives to CT in the much larger group of basically healthy children who are receiving occasional scans for widely prevalent conditions such as appendicitis and trauma than to attempt lowering CT use in the smaller group of patients with chronic conditions with a limited life expectancy. When communicating the CT risk with individual patients and their parents, we should acknowledge and address their concerns within the framework of informed decision-making. When appropriate, we may express the individual radiation risk, based on estimates of summated absorbed organ dose, as an order of magnitude rather than as an absolute number, and compare this with the much larger natural cancer incidence over a child's lifetime, and with other risks in medicine and daily life. We should anticipate that many patients cannot make informed decisions on their own in this complex matter, and we should offer our guidance while maintaining respect for patient autonomy. Proper documentation of the informed decision process is important for future reference. In concert with our referring physicians, pediatric radiologists are well-equipped to tackle the complexities

  17. Automatic Loss Adjustment for CDMA2000 and 1xEV-DO Standard for Downlink and Uplink

    Directory of Open Access Journals (Sweden)

    Jiri Kominek

    2014-01-01

    Full Text Available The functional and thermal testing of the mobile phone is always performed under various conditions that vary in terms of the connection between the DUT (Device Under Test and the measuring instrument. To achieve repeatable measurements under such conditions, it is necessary to adjust uplink and downlink loss using the instrument's external attenuation. While for GSM, WCDMA and LTE this is a relatively easy task, CDMA2000 and 1xEV-DO make automation of the adjustment process somewhat challenging due to the nature of the CDMA standard. An especially forward link is more complicated as those tests are run in signaling mode and not all instruments provide an FER value measured by an MS. This paper describes the algorithm for forward link loss adjustment and its implementation using Rohde & Schwarz CMW500.

  18. New hybrid reverse differential pulse position width modulation scheme for wireless optical communication

    Science.gov (United States)

    Liao, Renbo; Liu, Hongzhan; Qiao, Yaojun

    2014-05-01

    In order to improve the power efficiency and reduce the packet error rate of reverse differential pulse position modulation (RDPPM) for wireless optical communication (WOC), a hybrid reverse differential pulse position width modulation (RDPPWM) scheme is proposed, based on RDPPM and reverse pulse width modulation. Subsequently, the symbol structure of RDPPWM is briefly analyzed, and its performance is compared with that of other modulation schemes in terms of average transmitted power, bandwidth requirement, and packet error rate over ideal additive white Gaussian noise (AWGN) channels. Based on the given model, the simulation results show that the proposed modulation scheme has the advantages of improving the power efficiency and reducing the bandwidth requirement. Moreover, in terms of error probability performance, RDPPWM can achieve a much lower packet error rate than that of RDPPM. For example, at the same received signal power of -28 dBm, the packet error rate of RDPPWM can decrease to 2.6×10-12, while that of RDPPM is 2.2×10. Furthermore, RDPPWM does not need symbol synchronization at the receiving end. These considerations make RDPPWM a favorable candidate to select as the modulation scheme in the WOC systems.

  19. A performance improvement and cost-efficient ACO-OFDM scheme for visible light communications

    Science.gov (United States)

    Zhang, Tiantian; Zhou, Ji; Zhang, Zhenshan; Qiao, Yaojun; Su, Fei; Yang, Aiying

    2017-11-01

    In this paper, we propose a performance improvement and cost-efficient discrete Hartley transform (DHT)-based asymmetrically clipped optical orthogonal frequency division multiplexing (ACO-OFDM) scheme for visible light communications (VLC). The simple one-dimensional modulation constellation and simplified encoding structure reduce the complexity of system considerably. The DHT-spreading technique is employed to reduce peak-to-average power ratio (PAPR) of ACO-OFDM signals. Moreover, the intra-symbol frequency-domain averaging (ISFA) technique is used to increase the accuracy of channel estimation by removing the effect of ambient noise in the VLC channel effectively. To verify the feasibility of the proposed scheme, we study its performance via simulation. This scheme reduces the requirement to the resolution of DAC and increases the tolerance to the nonlinear characteristics of LED, both of which are cost-efficient. At forward error correction (FEC) limit (BER = 1 × 10-3), simulation results illustrate that compared with DHT-based ACO-OFDM without the ISFA technique, our scheme has 3.2 dB and 2.7 dB improvement of the required Eb /N0 when BPSK and 4-PAM are modulated, respectively.

  20. Breaking a chaos-based secure communication scheme designed by an improved modulation method

    Energy Technology Data Exchange (ETDEWEB)

    Li Shujun [Department of Electronic Engineering, City University of Hong Kong, Kowloon, Hong Kong (China)]. E-mail: hooklee@mail.com; Alvarez, Gonzalo [Instituto de Fisica Aplicada, Consejo Superior de Investigaciones Cientificas, Serrano 144-28006 Madrid (Spain); Chen Guanrong [Department of Electronic Engineering, City University of Hong Kong, Kowloon, Hong Kong (China)

    2005-07-01

    Recently Bu and Wang [Bu S, Wang B-H. Chaos, Solitons and Fractals 2004;19(4):919-24] proposed a simple modulation method aiming to improve the security of chaos-based secure communications against return-map-based attacks. Soon this modulation method was independently cryptanalyzed by Chee et al. [Chee CY, Xu D, Bishop SR. Chaos, Solitons and Fractals 2004;21(5):1129-34], Wu et al. [Wu X, Hu H, Zhang B. Chaos, Solitons and Fractals 2004;22(2):367-73], and Alvarez et al. [Alvarez G, Montoya F, Romera M, Pastor G. Chaos, Solitons and Fractals, in press, arXiv:nlin/0406065] via different attacks. As an enhancement to the Bu-Wang method, an improving scheme was suggested by Wu et al. by removing the relationship between the modulating function and the zero-points. The present paper points out that the improved scheme proposed by Wu et al. is still insecure against a new attack. Compared with the existing attacks, the proposed attack is more powerful and can also break the original Bu-Wang scheme. Furthermore, it is pointed out that the security of the modulation-based schemes proposed by Wu et al. is not so satisfactory from a pure cryptographical point of view. The synchronization performance of this class of modulation-based schemes is also discussed.

  1. Breaking a chaos-based secure communication scheme designed by an improved modulation method

    International Nuclear Information System (INIS)

    Li Shujun; Alvarez, Gonzalo; Chen Guanrong

    2005-01-01

    Recently Bu and Wang [Bu S, Wang B-H. Chaos, Solitons and Fractals 2004;19(4):919-24] proposed a simple modulation method aiming to improve the security of chaos-based secure communications against return-map-based attacks. Soon this modulation method was independently cryptanalyzed by Chee et al. [Chee CY, Xu D, Bishop SR. Chaos, Solitons and Fractals 2004;21(5):1129-34], Wu et al. [Wu X, Hu H, Zhang B. Chaos, Solitons and Fractals 2004;22(2):367-73], and Alvarez et al. [Alvarez G, Montoya F, Romera M, Pastor G. Chaos, Solitons and Fractals, in press, arXiv:nlin/0406065] via different attacks. As an enhancement to the Bu-Wang method, an improving scheme was suggested by Wu et al. by removing the relationship between the modulating function and the zero-points. The present paper points out that the improved scheme proposed by Wu et al. is still insecure against a new attack. Compared with the existing attacks, the proposed attack is more powerful and can also break the original Bu-Wang scheme. Furthermore, it is pointed out that the security of the modulation-based schemes proposed by Wu et al. is not so satisfactory from a pure cryptographical point of view. The synchronization performance of this class of modulation-based schemes is also discussed

  2. DEPLOYMENT OF ANTENNA ARRAY FOR DATA RETRIEVAL IN CDMA ENVIROMENT

    OpenAIRE

    RICARDO ZELENOVSKY

    2001-01-01

    Este trabalho de tese trata do emprego de arranjos de antenas em ambientes de comunicação móvel,dando-se ênfase ao canal de dados reverso do Sistema IS-95. Propõe-se dois estimadores: um para a direção de chegada dos sinais e outro para outros dados. Inicialmente é apresentado um estudo sobre arranjos de antenas e dos principais detalhes do sistema IS-95,especialmente a multiplicidade de acesso via divisão por códigos (CDMA).Aborda-se em seguida o problema d...

  3. Theoretical Investigation into Spectral Coexistence of CDMA and TDMA Systems

    Directory of Open Access Journals (Sweden)

    A.M. Abbosh

    2008-12-01

    Full Text Available The scarcity of available radio spectrum presently limits the extension of modern multimedia systems. This paper presents a theoretical investigation into the possibility of using a frequency overlay of a narrowband Code Division Multiple Access (CDMA System and a Time Division Multiple Access (TDMA System to provide a greater spectral efficiency. This paper shows that under certain conditions the two systems can operate in the same frequency band and in the same area with a considerable improvement in the overall capacity of the whole system.

  4. Performance comparison between S-ALOHA and R3T protocols for multirate OFFH-CDMA systems in optical packet networks

    Science.gov (United States)

    Inaty, Elie; Raad, Robert; Fortier, Paul; Shalaby, Hossam M.

    2006-12-01

    We discuss two newly proposed multiple-access control (MAC) protocols for multirate optical code-division multiple access (OCDMA) networks. The first protocol is slotted ALOHA/optical fast-frequency-hopping code-division multiple access (S-ALOHA/OFFH-CDMA), and the second is round-robin receiver-transmitter/optical fast-frequency-hopping code-division multiple access (R3/OFFH-CDMA). Our main subject is to exploit the potential of the optical fast-frequency-hopping CDMA using a fiber Bragg grating when jointly used with two different MAC protocols in a link layer as an effective way of integrating multirate traffic. The system throughput and the average packet delay are compared for both systems. It is shown that S-ALOHA is better than R3T when the user's activity and the offered load are high, whereas R3T is better for smaller values. Both protocols can be competitive in terms of the system throughput, with the advantage going to the R3T protocol at a moderate offered load. However, the R3T protocol suffers a higher delay mainly because of the presence of additional modes. Finally, the overlapped OCDMA system always outperforms the variable processing gain (VPG) OCDMA system regardless of the protocol used.

  5. Joint Frequency-Domain Equalization and Despreading for Multi-Code DS-CDMA Using Cyclic Delay Transmit Diversity

    Science.gov (United States)

    Yamamoto, Tetsuya; Takeda, Kazuki; Adachi, Fumiyuki

    Frequency-domain equalization (FDE) based on the minimum mean square error (MMSE) criterion can provide a better bit error rate (BER) performance than rake combining. To further improve the BER performance, cyclic delay transmit diversity (CDTD) can be used. CDTD simultaneously transmits the same signal from different antennas after adding different cyclic delays to increase the number of equivalent propagation paths. Although a joint use of CDTD and MMSE-FDE for direct sequence code division multiple access (DS-CDMA) achieves larger frequency diversity gain, the BER performance improvement is limited by the residual inter-chip interference (ICI) after FDE. In this paper, we propose joint FDE and despreading for DS-CDMA using CDTD. Equalization and despreading are simultaneously performed in the frequency-domain to suppress the residual ICI after FDE. A theoretical conditional BER analysis is presented for the given channel condition. The BER analysis is confirmed by computer simulation.

  6. Blind Multiuser Detection by Kurtosis Maximization for Asynchronous Multirate DS/CDMA Systems

    Directory of Open Access Journals (Sweden)

    Peng Chun-Hsien

    2006-01-01

    Full Text Available Chi et al. proposed a fast kurtosis maximization algorithm (FKMA for blind equalization/deconvolution of multiple-input multiple-output (MIMO linear time-invariant systems. This algorithm has been applied to blind multiuser detection of single-rate direct-sequence/code-division multiple-access (DS/CDMA systems and blind source separation (or independent component analysis. In this paper, the FKMA is further applied to blind multiuser detection for multirate DS/CDMA systems. The ideas are to properly formulate discrete-time MIMO signal models by converting real multirate users into single-rate virtual users, followed by the use of FKMA for extraction of virtual users' data sequences associated with the desired user, and recovery of the data sequence of the desired user from estimated virtual users' data sequences. Assuming that all the users' spreading sequences are given a priori, two multirate blind multiuser detection algorithms (with either a single receive antenna or multiple antennas, which also enjoy the merits of superexponential convergence rate and guaranteed convergence of the FKMA, are proposed in the paper, one based on a convolutional MIMO signal model and the other based on an instantaneous MIMO signal model. Some simulation results are then presented to demonstrate their effectiveness and to provide a performance comparison with some existing algorithms.

  7. A Novel Mobile Communications Authentication Scheme with Roaming Service and User Anonymity

    Directory of Open Access Journals (Sweden)

    Kai Chain

    2016-11-01

    Full Text Available Many novel, effective, and efficient applications and networking services are being developed for the Social Internet of Things. Recently, Li proposed a more secure and efficient authentication scheme with roaming service and user anonymity for mobile communications. The security analysis and discussion of the agreement phase is sufficiently safe; however, an attacker can intercept the identity of a mobile user’s home agent in the authentication phase. By using this information, the attacker can mount distributed denial-of-service attacks in the roaming phase through replay attacks targeting the network’s foreign agent and mobile user’s home agent by using their corresponding session keys. Li’s method also has some shortcomings regarding anonymity that we aim to address. To overcome these issues, this study proposes an elliptic curve–based wireless roaming anonymous login method for the authentication phase. The problems faced in the roaming phase are resolved, and this approach provides balanced session key computation between senders and receivers. Burrows-Abadi-Needham logic (BAN-logic is used to verify the security of the proposed scheme. The proposed scheme affords good security, efficiency, and integrity and maintains anonymity.

  8. Joint Impact of Frequency Synchronization Errors and Intermodulation Distortion on the Performance of Multicarrier DS-CDMA Systems

    Directory of Open Access Journals (Sweden)

    Rugini Luca

    2005-01-01

    Full Text Available The performance of multicarrier systems is highly impaired by intercarrier interference (ICI due to frequency synchronization errors at the receiver and by intermodulation distortion (IMD introduced by a nonlinear amplifier (NLA at the transmitter. In this paper, we evaluate the bit-error rate (BER of multicarrier direct-sequence code-division multiple-access (MC-DS-CDMA downlink systems subject to these impairments in frequency-selective Rayleigh fading channels, assuming quadrature amplitude modulation (QAM. The analytical findings allow to establish the sensitivity of MC-DS-CDMA systems to carrier frequency offset (CFO and NLA distortions, to identify the maximum CFO that is tolerable at the receiver side in different scenarios, and to find out the optimum value of the NLA output power backoff for a given CFO. Simulation results show that the approximated analysis is quite accurate in several conditions.

  9. MRI-based treatment planning with pseudo CT generated through atlas registration.

    Science.gov (United States)

    Uh, Jinsoo; Merchant, Thomas E; Li, Yimei; Li, Xingyu; Hua, Chiaho

    2014-05-01

    To evaluate the feasibility and accuracy of magnetic resonance imaging (MRI)-based treatment planning using pseudo CTs generated through atlas registration. A pseudo CT, providing electron density information for dose calculation, was generated by deforming atlas CT images previously acquired on other patients. The authors tested 4 schemes of synthesizing a pseudo CT from single or multiple deformed atlas images: use of a single arbitrarily selected atlas, arithmetic mean process using 6 atlases, and pattern recognition with Gaussian process (PRGP) using 6 or 12 atlases. The required deformation for atlas CT images was derived from a nonlinear registration of conjugated atlas MR images to that of the patient of interest. The contrasts of atlas MR images were adjusted by histogram matching to reduce the effect of different sets of acquisition parameters. For comparison, the authors also tested a simple scheme assigning the Hounsfield unit of water to the entire patient volume. All pseudo CT generating schemes were applied to 14 patients with common pediatric brain tumors. The image similarity of real patient-specific CT and pseudo CTs constructed by different schemes was compared. Differences in computation times were also calculated. The real CT in the treatment planning system was replaced with the pseudo CT, and the dose distribution was recalculated to determine the difference. The atlas approach generally performed better than assigning a bulk CT number to the entire patient volume. Comparing atlas-based schemes, those using multiple atlases outperformed the single atlas scheme. For multiple atlas schemes, the pseudo CTs were similar to the real CTs (correlation coefficient, 0.787-0.819). The calculated dose distribution was in close agreement with the original dose. Nearly the entire patient volume (98.3%-98.7%) satisfied the criteria of chi-evaluation (pediatric brain tumor patients. The doses calculated from pseudo CTs agreed well with those from real CTs

  10. An Interference Mitigation Scheme of Device-to-Device Communications for Sensor Networks Underlying LTE-A.

    Science.gov (United States)

    Kim, Jeehyeong; Karim, Nzabanita Abdoul; Cho, Sunghyun

    2017-05-10

    Device-to-Device (D2D) communication technology has become a key factor in wireless sensor networks to form autonomous communication links among sensor nodes. Many research results for D2D have been presented to resolve different technical issues of D2D. Nevertheless, the previous works have not resolved the shortage of data rate and limited coverage of wireless sensor networks. Due to bandwidth shortages and limited communication coverage, 3rd Generation Partnership Project (3GPP) has introduced a new Device-to-Device (D2D) communication technique underlying cellular networks, which can improve spectral efficiencies by enabling the direct communication of devices in proximity without passing through enhanced-NodeB (eNB). However, to enable D2D communication in a cellular network presents a challenge with regard to radio resource management since D2D links reuse the uplink radio resources of cellular users and it can cause interference to the receiving channels of D2D user equipment (DUE). In this paper, a hybrid mechanism is proposed that uses Fractional Frequency Reuse (FFR) and Almost Blank Sub-frame (ABS) schemes to handle inter-cell interference caused by cellular user equipments (CUEs) to D2D receivers (DUE-Rxs), reusing the same resources at the cell edge area. In our case, DUE-Rxs are considered as victim nodes and CUEs as aggressor nodes, since our primary target is to minimize inter-cell interference in order to increase the signal to interference and noise ratio (SINR) of the target DUE-Rx at the cell edge area. The numerical results show that the interference level of the target D2D receiver (DUE-Rx) decreases significantly compared to the conventional FFR at the cell edge. In addition, the system throughput of the proposed scheme can be increased up to 60% compared to the conventional FFR.

  11. Wideband Impulse Modulation and Receiver Algorithms for Multiuser Power Line Communications

    Directory of Open Access Journals (Sweden)

    Andrea M. Tonello

    2007-01-01

    Full Text Available We consider a bit-interleaved coded wideband impulse-modulated system for power line communications. Impulse modulation is combined with direct-sequence code-division multiple access (DS-CDMA to obtain a form of orthogonal modulation and to multiplex the users. We focus on the receiver signal processing algorithms and derive a maximum likelihood frequency-domain detector that takes into account the presence of impulse noise as well as the intercode interference (ICI and the multiple-access interference (MAI that are generated by the frequency-selective power line channel. To reduce complexity, we propose several simplified frequency-domain receiver algorithms with different complexity and performance. We address the problem of the practical estimation of the channel frequency response as well as the estimation of the correlation of the ICI-MAI-plus-noise that is needed in the detection metric. To improve the estimators performance, a simple hard feedback from the channel decoder is also used. Simulation results show that the scheme provides robust performance as a result of spreading the symbol energy both in frequency (through the wideband pulse and in time (through the spreading code and the bit-interleaved convolutional code.

  12. EBAA: An efficient broadcast authentication scheme for ADS-B communication based on IBS-MR

    Directory of Open Access Journals (Sweden)

    Yang Haomiao

    2014-06-01

    Full Text Available Automatic dependent surveillance-broadcast (ADS-B systems can broadcast satellite-based aircraft position, identification, etc., periodically, and are now on track to replace radar to become the backbone of next-generation air traffic management (ATM systems. However, ADS-B systems suffer severe cyber-security problems due to the broadcast-type data link and the lack of designed-in security measures. Especially, since ADS-B messages are unauthenticated, it is easy to insert fake aircraft into a system via spoofing or insertion of false messages. Unfortunately, the authentication for ADS-B messages has not yet been well studied. In this paper, based on identity-based signature with message recovery (IBS-MR, an efficient broadcast authentication scheme for ADS-B messages is proposed. The security analysis demonstrates that the scheme can achieve authenticity and integrity of ADS-B broadcast messages, as well as adaptive evolution of broadcasters’ private keys. The performance evaluation shows that the scheme is computationally efficient for typical avionics devices with limited resources. Furthermore, the scheme achieves low communication overhead since broadcast messages can be recovered from signatures, and thus it is suitable for low-bandwidth ADS-B data link.

  13. Bursae and abscess cavities communicating with the hip: diagnosis using arthrography and CT

    International Nuclear Information System (INIS)

    Steinbach, L.S.; Schneider, R.; Goldman, A.B.; Kazam, E.; Ranawat, C.S.; Ghelman, B.

    1985-01-01

    Bursae or abscess cavities communicating with the hip joint were demonstrated by hip arthrography or by computed tomography (CT) in 40 cases. The bursae or abscess cavities were associated with underlying abnormalities in the hip, including painful hip prostheses, infection, and inflammatory or degenerative arthritis. Symptoms may be produced directly as a result of infection or indirectly as a result of inflammation or pressure on adjacent structures. Hip arthrography can confirm a diagnosis of bursae and abscess cavities communicating with the hip joint in patients with hip pain or soft-tissue masses around the groin. Differentiation of enlarged bursae from other abnormalities is important to avoid unnecessary or incorrect surgery

  14. Adaptive Code Division Multiple Access Protocol for Wireless Network-on-Chip Architectures

    Science.gov (United States)

    Vijayakumaran, Vineeth

    Massive levels of integration following Moore's Law ushered in a paradigm shift in the way on-chip interconnections were designed. With higher and higher number of cores on the same die traditional bus based interconnections are no longer a scalable communication infrastructure. On-chip networks were proposed enabled a scalable plug-and-play mechanism for interconnecting hundreds of cores on the same chip. Wired interconnects between the cores in a traditional Network-on-Chip (NoC) system, becomes a bottleneck with increase in the number of cores thereby increasing the latency and energy to transmit signals over them. Hence, there has been many alternative emerging interconnect technologies proposed, namely, 3D, photonic and multi-band RF interconnects. Although they provide better connectivity, higher speed and higher bandwidth compared to wired interconnects; they also face challenges with heat dissipation and manufacturing difficulties. On-chip wireless interconnects is one other alternative proposed which doesn't need physical interconnection layout as data travels over the wireless medium. They are integrated into a hybrid NOC architecture consisting of both wired and wireless links, which provides higher bandwidth, lower latency, lesser area overhead and reduced energy dissipation in communication. However, as the bandwidth of the wireless channels is limited, an efficient media access control (MAC) scheme is required to enhance the utilization of the available bandwidth. This thesis proposes using a multiple access mechanism such as Code Division Multiple Access (CDMA) to enable multiple transmitter-receiver pairs to send data over the wireless channel simultaneously. It will be shown that such a hybrid wireless NoC with an efficient CDMA based MAC protocol can significantly increase the performance of the system while lowering the energy dissipation in data transfer. In this work it is shown that the wireless NoC with the proposed CDMA based MAC protocol

  15. A CDMA multiuser detection algorithm on the basis of belief propagation

    International Nuclear Information System (INIS)

    Kabashima, Yoshiyuki

    2003-01-01

    An iterative algorithm for the multiuser detection problem that arises in code division multiple access (CDMA) systems is developed on the basis of Pearl's belief propagation (BP). We show that the BP-based algorithm exhibits nearly optimal performance in a practical time scale by utilizing the central limit theorem and self-averaging property appropriately, whereas direct application of BP to the detection problem is computationally difficult and far from practical. We further present close relationships of the proposed algorithm to the Thouless-Anderson-Palmer approach and replica analysis known in spin-glass research

  16. Free-space optical code-division multiple-access system design

    Science.gov (United States)

    Jeromin, Lori L.; Kaufmann, John E.; Bucher, Edward A.

    1993-08-01

    This paper describes an optical direct-detection multiple access communications system for free-space satellite networks utilizing code-division multiple-access (CDMA) and forward error correction (FEC) coding. System performance is characterized by how many simultaneous users operating at data rate R can be accommodated in a signaling bandwidth W. The performance of two CDMA schemes, optical orthogonal codes (OOC) with FEC and orthogonal convolutional codes (OCC), is calculated and compared to information-theoretic capacity bounds. The calculations include the effects of background and detector noise as well as nonzero transmitter extinction ratio and power imbalance among users. A system design for 10 kbps multiple-access communications between low-earth orbit satellites is given. With near- term receiver technology and representative system losses, a 15 W peak-power transmitter provides 10-6 BER performance with seven interfering users and full moon background in the receiver FOV. The receiver employs an array of discrete wide-area avalanche photodiodes (APD) for wide field of view coverage. Issues of user acquisition and synchronization, implementation technology, and system scalability are also discussed.

  17. Design and Implementation of a Novel Compatible Encoding Scheme in the Time Domain for Image Sensor Communication

    Directory of Open Access Journals (Sweden)

    Trang Nguyen

    2016-05-01

    Full Text Available This paper presents a modulation scheme in the time domain based on On-Off-Keying and proposes various compatible supports for different types of image sensors. The content of this article is a sub-proposal to the IEEE 802.15.7r1 Task Group (TG7r1 aimed at Optical Wireless Communication (OWC using an image sensor as the receiver. The compatibility support is indispensable for Image Sensor Communications (ISC because the rolling shutter image sensors currently available have different frame rates, shutter speeds, sampling rates, and resolutions. However, focusing on unidirectional communications (i.e., data broadcasting, beacons, an asynchronous communication prototype is also discussed in the paper. Due to the physical limitations associated with typical image sensors (including low and varying frame rates, long exposures, and low shutter speeds, the link speed performance is critically considered. Based on the practical measurement of camera response to modulated light, an operating frequency range is suggested along with the similar system architecture, decoding procedure, and algorithms. A significant feature of our novel data frame structure is that it can support both typical frame rate cameras (in the oversampling mode as well as very low frame rate cameras (in the error detection mode for a camera whose frame rate is lower than the transmission packet rate. A high frame rate camera, i.e., no less than 20 fps, is supported in an oversampling mode in which a majority voting scheme for decoding data is applied. A low frame rate camera, i.e., when the frame rate drops to less than 20 fps at some certain time, is supported by an error detection mode in which any missing data sub-packet is detected in decoding and later corrected by external code. Numerical results and valuable analysis are also included to indicate the capability of the proposed schemes.

  18. An Adaptive Fault-Tolerant Communication Scheme for Body Sensor Networks

    Directory of Open Access Journals (Sweden)

    Zichuan Xu

    2010-10-01

    Full Text Available A high degree of reliability for critical data transmission is required in body sensor networks (BSNs. However, BSNs are usually vulnerable to channel impairments due to body fading effect and RF interference, which may potentially cause data transmission to be unreliable. In this paper, an adaptive and flexible fault-tolerant communication scheme for BSNs, namely AFTCS, is proposed. AFTCS adopts a channel bandwidth reservation strategy to provide reliable data transmission when channel impairments occur. In order to fulfill the reliability requirements of critical sensors, fault-tolerant priority and queue are employed to adaptively adjust the channel bandwidth allocation. Simulation results show that AFTCS can alleviate the effect of channel impairments, while yielding lower packet loss rate and latency for critical sensors at runtime.

  19. A new encoding scheme for visible light communications with applications to mobile connections

    Science.gov (United States)

    Benton, David M.; St. John Brittan, Paul

    2017-10-01

    A new, novel and unconventional encoding scheme called concurrent coding, has recently been demonstrated and shown to offer interesting features and benefits in comparison to conventional techniques, such as robustness against burst errors and improved efficiency of transmitted power. Free space optical communications can suffer particularly from issues of alignment which requires stable, fixed links to be established and beam wander which can interrupt communications. Concurrent coding has the potential to help ease these difficulties and enable mobile, flexible optical communications to be implemented through the use of a source encoding technique. This concept has been applied for the first time to optical communications where standard light emitting diodes (LEDs) have been used to transmit information encoded with concurrent coding. The technique successfully transmits and decodes data despite unpredictable interruptions to the transmission causing significant drop-outs to the detected signal. The technique also shows how it is possible to send a single block of data in isolation with no pre-synchronisation required between transmitter and receiver, and no specific synchronisation sequence appended to the transmission. Such systems are robust against interference - intentional or otherwise - as well as intermittent beam blockage.

  20. Alternative Line Coding Scheme with Fixed Dimming for Visible Light Communication

    Science.gov (United States)

    Niaz, M. T.; Imdad, F.; Kim, H. S.

    2017-01-01

    An alternative line coding scheme called fixed-dimming on/off keying (FD-OOK) is proposed for visible-light communication (VLC). FD-OOK reduces the flickering caused by a VLC transmitter and can maintain a 50% dimming level. Simple encoder and decoder are proposed which generates codes where the number of bits representing one is same as the number of bits representing zero. By keeping the number of ones and zeros equal the change in the brightness of lighting may be minimized and kept constant at 50%, thereby reducing the flickering in VLC. The performance of FD-OOK is analysed with two parameters: the spectral efficiency and power requirement.

  1. Performance Analysis of Polarization Modulated DirectDetection Optical CDMA Systems over Turbulent FSO LinksModeled by the Gamma-Gamma Distribution

    Directory of Open Access Journals (Sweden)

    Fan Bai

    2015-01-01

    Full Text Available This paper proposes a theoretical study to characterize the transmission of optical code division multiple access (CDMA systems deploying polarization shift keying (PolSK over a free space optical (FSO link under the impact of atmospheric turbulence. In our analysis, a novel transceiver architecture for atmospheric OCDMA FSO systems based on polarization modulation with direct detection is proposed and discussed. A detailed analytical model for PolSK-OCDMA systems over a turbulent FSO link is provided. Further, we derive a closed-form bit error ratio (BER and outage probability expressions, taking into account the multiple-access interference (MAI, optical noise and the atmospheric turbulence effect on the FSO link modeled by the Gamma-Gamma distribution. Finally, the results of this study show the most significant parameters that degrade the transmission performance of the PolSK-OCDMA signal over FSO links and indicate that the proposed approach offers improved bit error ratio (BER performances compared to the on-off-keying (OOK modulation scheme in the presence of turbulence.

  2. Lightweight SIP/SDP compression scheme (LSSCS)

    Science.gov (United States)

    Wu, Jian J.; Demetrescu, Cristian

    2001-10-01

    In UMTS new IP based services with tight delay constraints will be deployed over the W-CDMA air interface such as IP multimedia and interactive services. To integrate the wireline and wireless IP services, 3GPP standard forum adopted the Session Initiation Protocol (SIP) as the call control protocol for the UMTS Release 5, which will implement next generation, all IP networks for real-time QoS services. In the current form the SIP protocol is not suitable for wireless transmission due to its large message size which will need either a big radio pipe for transmission or it will take far much longer to transmit than the current GSM Call Control (CC) message sequence. In this paper we present a novel compression algorithm called Lightweight SIP/SDP Compression Scheme (LSSCS), which acts at the SIP application layer and therefore removes the information redundancy before it is sent to the network and transport layer. A binary octet-aligned header is added to the compressed SIP/SDP message before sending it to the network layer. The receiver uses this binary header as well as the pre-cached information to regenerate the original SIP/SDP message. The key features of the LSSCS compression scheme are presented in this paper along with implementation examples. It is shown that this compression algorithm makes SIP transmission efficient over the radio interface without losing the SIP generality and flexibility.

  3. Cryptanalysis of a chaotic communication scheme using adaptive observer.

    Science.gov (United States)

    Liu, Ying; Tang, Wallace K S

    2008-12-01

    This paper addresses the cryptanalysis of a secure communication scheme recently proposed by Wu [Chaos 16, 043118 (2006)], where the information signal is modulated into a system parameter of a unified chaotic system. With the Kerckhoff principle, assuming that the structure of the cryptosystem is known, an adaptive observer can be designed to synchronize the targeted system, so that the transmitted information and the user-specific parameters are obtained. The success of adaptive synchronization is mathematically proved with the use of Lyapunov stability theory, based on the original assumption, i.e., the dynamical evolution of the information signal is available. A more practical case, but yet much more difficult, is also considered. As demonstrated with simulations, generalized synchronization is still possible, even if the derivative of the information signal is kept secret. Hence, the message can be coarsely estimated, making the security of the considered system questionable.

  4. A Novel Scheme of Fast-frequency Hopping Optical CDMA System with No-hit-zone Sequence

    Science.gov (United States)

    Ji, Jianhua; liu, Ling; Wang, Ke; Zhang, Zhipeng; Xu, Ming

    2013-09-01

    In traditional fast frequency-hopping OCDMA (FFH-OCDMA) system, beat noise and multiple-access interference are the main performance limitations, and complicated power control must be employed to eliminate the near-far effect. In this paper, a novel scheme of FFH-OCDMA with no-hit-zone sequence is proposed, which is named NHZ FFH-OCDMA. In NHZ FFH-OCDMA, the synchronization among users can be controlled within permissible time delay, and the code cross-correlation for different users equals zero. Therefore, near-far effect can be eliminated. Furthermore, beat noise and multiple-access interference also can be removed. Simulation of eight simultaneous users with dada rate 100 Mbit/s is demonstrated, where the fiber link consists of 50 km single-mode fiber, plus 5 km dispersion compensating fiber. Simulation results show that the near-far problem of NHZ FFH-OCDMA can be eliminated, and complicated power control can be removed. Therefore, this scheme is a good candidate for optical access network.

  5. Periventricular hypodensity in communicating hydrocephalus studied by metrizamide CT cisternography

    International Nuclear Information System (INIS)

    Hiratsuka, Hideo; Okada, Kodai; Takasato, Yoshio; Inaba, Yutaka; Tsuyumu, Matsutaira.

    1979-01-01

    Modification of periventricular hypodensity in suspected communicating hydrocephalus was investigated by metrizamide CT cisternography. Six to eight ml of metrizamide isotonic solution with a concentration of 170 mgI/ml was given through lumbar puncture and scanning was conducted 1, 3, 6, 24 and 48 hrs after injection. In addition to visual analysis of images, mean value and standard deviation were calculated for Hounsfield units of the regions of interest at the anterolateral angle of frontal horn and the time courses of the attenuation values were statistically compared to each other at each scanning time. The results were classified into four groups: 1) periventricular low density zone with gradual penetration of metrizamide therein; 2) periventricular low density zone without penetration of metrizamide therein; 3) minimal periventricular low density zone with minimal metrizamide penetration; and 4) no periventricular low density zone and no penetration of metrizamide. The presence of a periventricular low density zone with increase of the density after ventricular reflux of metrizamide would be an important criterion for CSF shunting operation in normal pressure hydrocephalus or communicating hydrocephalus. (author)

  6. Redes celulares de tercera generación: CDMA2000 Y WCDMA

    OpenAIRE

    Jaime Sánchez García; Myriam Meza Múgica

    2005-01-01

    Este artículo ofrece un panorama general de los sistemas de comunicaciones móviles celulares de tercera generación (3G) que han tenido una mayor aceptación (CDMA2000 y WCDMA) en el mercado, y una comparación basada en los puntos principales donde los sistemas difieren que indica las ventajas y desventajas de cada uno. Los sistemas de comunicaciones móviles celulares 3G ofrecen mayores capacidades de transmisión a los de segunda generación (2G), y permiten brindar, además de los tr...

  7. Support vector machine multiuser receiver for DS-CDMA signals in multipath channels.

    Science.gov (United States)

    Chen, S; Samingan, A K; Hanzo, L

    2001-01-01

    The problem of constructing an adaptive multiuser detector (MUD) is considered for direct sequence code division multiple access (DS-CDMA) signals transmitted through multipath channels. The emerging learning technique, called support vector machines (SVM), is proposed as a method of obtaining a nonlinear MUD from a relatively small training data block. Computer simulation is used to study this SVM MUD, and the results show that it can closely match the performance of the optimal Bayesian one-shot detector. Comparisons with an adaptive radial basis function (RBF) MUD trained by an unsupervised clustering algorithm are discussed.

  8. Scalable Nonlinear Compact Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Ghosh, Debojyoti [Argonne National Lab. (ANL), Argonne, IL (United States); Constantinescu, Emil M. [Univ. of Chicago, IL (United States); Brown, Jed [Univ. of Colorado, Boulder, CO (United States)

    2014-04-01

    In this work, we focus on compact schemes resulting in tridiagonal systems of equations, specifically the fifth-order CRWENO scheme. We propose a scalable implementation of the nonlinear compact schemes by implementing a parallel tridiagonal solver based on the partitioning/substructuring approach. We use an iterative solver for the reduced system of equations; however, we solve this system to machine zero accuracy to ensure that no parallelization errors are introduced. It is possible to achieve machine-zero convergence with few iterations because of the diagonal dominance of the system. The number of iterations is specified a priori instead of a norm-based exit criterion, and collective communications are avoided. The overall algorithm thus involves only point-to-point communication between neighboring processors. Our implementation of the tridiagonal solver differs from and avoids the drawbacks of past efforts in the following ways: it introduces no parallelization-related approximations (multiprocessor solutions are exactly identical to uniprocessor ones), it involves minimal communication, the mathematical complexity is similar to that of the Thomas algorithm on a single processor, and it does not require any communication and computation scheduling.

  9. Multi-Sensor Detection with Particle Swarm Optimization for Time-Frequency Coded Cooperative WSNs Based on MC-CDMA for Underground Coal Mines

    Directory of Open Access Journals (Sweden)

    Jingjing Xu

    2015-08-01

    Full Text Available In this paper, a wireless sensor network (WSN technology adapted to underground channel conditions is developed, which has important theoretical and practical value for safety monitoring in underground coal mines. According to the characteristics that the space, time and frequency resources of underground tunnel are open, it is proposed to constitute wireless sensor nodes based on multicarrier code division multiple access (MC-CDMA to make full use of these resources. To improve the wireless transmission performance of source sensor nodes, it is also proposed to utilize cooperative sensors with good channel conditions from the sink node to assist source sensors with poor channel conditions. Moreover, the total power of the source sensor and its cooperative sensors is allocated on the basis of their channel conditions to increase the energy efficiency of the WSN. To solve the problem that multiple access interference (MAI arises when multiple source sensors transmit monitoring information simultaneously, a kind of multi-sensor detection (MSD algorithm with particle swarm optimization (PSO, namely D-PSO, is proposed for the time-frequency coded cooperative MC-CDMA WSN. Simulation results show that the average bit error rate (BER performance of the proposed WSN in an underground coal mine is improved significantly by using wireless sensor nodes based on MC-CDMA, adopting time-frequency coded cooperative transmission and D-PSO algorithm with particle swarm optimization.

  10. Multi-Sensor Detection with Particle Swarm Optimization for Time-Frequency Coded Cooperative WSNs Based on MC-CDMA for Underground Coal Mines.

    Science.gov (United States)

    Xu, Jingjing; Yang, Wei; Zhang, Linyuan; Han, Ruisong; Shao, Xiaotao

    2015-08-27

    In this paper, a wireless sensor network (WSN) technology adapted to underground channel conditions is developed, which has important theoretical and practical value for safety monitoring in underground coal mines. According to the characteristics that the space, time and frequency resources of underground tunnel are open, it is proposed to constitute wireless sensor nodes based on multicarrier code division multiple access (MC-CDMA) to make full use of these resources. To improve the wireless transmission performance of source sensor nodes, it is also proposed to utilize cooperative sensors with good channel conditions from the sink node to assist source sensors with poor channel conditions. Moreover, the total power of the source sensor and its cooperative sensors is allocated on the basis of their channel conditions to increase the energy efficiency of the WSN. To solve the problem that multiple access interference (MAI) arises when multiple source sensors transmit monitoring information simultaneously, a kind of multi-sensor detection (MSD) algorithm with particle swarm optimization (PSO), namely D-PSO, is proposed for the time-frequency coded cooperative MC-CDMA WSN. Simulation results show that the average bit error rate (BER) performance of the proposed WSN in an underground coal mine is improved significantly by using wireless sensor nodes based on MC-CDMA, adopting time-frequency coded cooperative transmission and D-PSO algorithm with particle swarm optimization.

  11. Faithful One-way Trip Deterministic Secure Quantum Communication Scheme Against Collective Rotating Noise Based on Order Rearrangement of Photon Pairs

    Science.gov (United States)

    Yuan, Hao; Zhang, Qin; Hong, Liang; Yin, Wen-jie; Xu, Dong

    2014-08-01

    We present a novel scheme for deterministic secure quantum communication (DSQC) over collective rotating noisy channel. Four special two-qubit states are found can constitute a noise-free subspaces, and so are utilized as quantum information carriers. In this scheme, the information carriers transmite over the quantum channel only one time, which can effectively reduce the influence of other noise existing in quantum channel. The information receiver need only perform two single-photon collective measurements to decode the secret messages, which can make the present scheme more convenient in practical application. It will be showed that our scheme has a relatively high information capacity and intrisic efficiency. Foremostly, the decoy photon pair checking technique and the order rearrangement of photon pairs technique guarantee that the present scheme is unconditionally secure.

  12. GRAS: A Group Reliant Authentication Scheme for V2V Communication in VANET

    Directory of Open Access Journals (Sweden)

    Auxeeliya Jesudoss

    2013-08-01

    Full Text Available Unlike fixed or wired networks, mobile ad-hoc networks pose a number of challenges for peer-to-peer communication due to their dynamic nature. This paper presents a novel framework for vehicleto- vehicle communication controlled and facilitated by a group leader within a group of vehicles. A communication model for a pure ad-hoc network is developed with much concern about the privacy and security of the system, for the ease of effective communication between vehicles with a reduced communication and computational overhead when no fixed infrastructure is present in the roadsides. In the proposed protocol, vehicles within a radio frequency form a group. They elect their leader based on some criteria who is then responsible for generating a group public and private key pair. Each vehicle is equipped with a tamper resistant OBU which is capable of generating public/private keys pairs and also self-certifies the generated keys based on one way hash chaining technique. Any vehicle joins the group communicates the group leader, authenticates itself to obtain the group key. Later, the vehicle uses the group key to send traffic related messages to the group leader who is responsible for batch verifying the authenticity of the message from different sources and one hop broadcast them to reduce the computation overhead on message verification in each vehicle. In addition, our scheme adopts the k-anonymity approach to protect user identity privacy, where an attacker cannot associate a message with the sending vehicle. Extensive analysis and simulations show that the proposed architecture provides an efficient and fully self organized system management for car-to-car communication without the need of any external infrastructure.

  13. Performance Analysis of Direct-Sequence Code-Division Multiple-Access Communications with Asymmetric Quadrature Phase-Shift-Keying Modulation

    Science.gov (United States)

    Wang, C.-W.; Stark, W.

    2005-01-01

    This article considers a quaternary direct-sequence code-division multiple-access (DS-CDMA) communication system with asymmetric quadrature phase-shift-keying (AQPSK) modulation for unequal error protection (UEP) capability. Both time synchronous and asynchronous cases are investigated. An expression for the probability distribution of the multiple-access interference is derived. The exact bit-error performance and the approximate performance using a Gaussian approximation and random signature sequences are evaluated by extending the techniques used for uniform quadrature phase-shift-keying (QPSK) and binary phase-shift-keying (BPSK) DS-CDMA systems. Finally, a general system model with unequal user power and the near-far problem is considered and analyzed. The results show that, for a system with UEP capability, the less protected data bits are more sensitive to the near-far effect that occurs in a multiple-access environment than are the more protected bits.

  14. Wireless Phone Threat Assessment for Aircraft Communication and Navigation Radios

    Science.gov (United States)

    Nguyens, T. X.; Koppen, S. V.; Smith, L. J.; Williams, R. A.; Salud, M. T.

    2005-01-01

    Emissions in aircraft communication and navigation bands are measured for the latest generation of wireless phones. The two wireless technologies considered, GSM/GPRS and CDMA2000, are the latest available to general consumers in the U.S. A base-station simulator is used to control the phones. The measurements are conducted using reverberation chambers, and the results are compared against FCC and aircraft installed equipment emission limits. The results are also compared against baseline emissions from laptop computers and personal digital assistant devices that are currently allowed to operate on aircraft.

  15. A novel adaptive joint power control algorithm with channel estimation in a CDMA cellular system

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    Joint power control has advantages of multi-user detection and power control; and it can combat the multi-access interference and the near-far problem. A novel adaptive joint power control algorithm with channel estimation in a CDMA cellular system was designed. Simulation results show that the algorithm can control the power not only quickly but also precisely with a time change. The method is useful for increasing system capacity.

  16. Feasibility of megavoltage portal CT using an electronic portal imaging device (EPID) and a multi-level scheme algebraic reconstruction technique (MLS-ART)

    International Nuclear Information System (INIS)

    Guan, Huaiqun; Zhu, Yunping

    1998-01-01

    Although electronic portal imaging devices (EPIDs) are efficient tools for radiation therapy verification, they only provide images of overlapped anatomic structures. We investigated using a fluorescent screen/CCD-based EPID, coupled with a novel multi-level scheme algebraic reconstruction technique (MLS-ART), for a feasibility study of portal computed tomography (CT) reconstructions. The CT images might be useful for radiation treatment planning and verification. We used an EPID, set it to work at the linear dynamic range and collimated 6 MV photons from a linear accelerator to a slit beam of 1 cm wide and 25 cm long. We performed scans under a total of ∼200 monitor units (MUs) for several phantoms in which we varied the number of projections and MUs per projection. The reconstructed images demonstrated that using the new MLS-ART technique megavoltage portal CT with a total of 200 MUs can achieve a contrast detectibility of ∼2.5% (object size 5mmx5mm) and a spatial resolution of 2.5 mm. (author)

  17. THROUGHPUT ANALYSIS OF EXTENDED ARQ SCHEMES

    African Journals Online (AJOL)

    PUBLICATIONS1

    ABSTRACT. Various Automatic Repeat Request (ARQ) schemes have been used to combat errors that befall in- formation transmitted in digital communication systems. Such schemes include simple ARQ, mixed mode ARQ and Hybrid ARQ (HARQ). In this study we introduce extended ARQ schemes and derive.

  18. MRI-based treatment planning with pseudo CT generated through atlas registration

    International Nuclear Information System (INIS)

    Uh, Jinsoo; Merchant, Thomas E.; Hua, Chiaho; Li, Yimei; Li, Xingyu

    2014-01-01

    Purpose: To evaluate the feasibility and accuracy of magnetic resonance imaging (MRI)-based treatment planning using pseudo CTs generated through atlas registration. Methods: A pseudo CT, providing electron density information for dose calculation, was generated by deforming atlas CT images previously acquired on other patients. The authors tested 4 schemes of synthesizing a pseudo CT from single or multiple deformed atlas images: use of a single arbitrarily selected atlas, arithmetic mean process using 6 atlases, and pattern recognition with Gaussian process (PRGP) using 6 or 12 atlases. The required deformation for atlas CT images was derived from a nonlinear registration of conjugated atlas MR images to that of the patient of interest. The contrasts of atlas MR images were adjusted by histogram matching to reduce the effect of different sets of acquisition parameters. For comparison, the authors also tested a simple scheme assigning the Hounsfield unit of water to the entire patient volume. All pseudo CT generating schemes were applied to 14 patients with common pediatric brain tumors. The image similarity of real patient-specific CT and pseudo CTs constructed by different schemes was compared. Differences in computation times were also calculated. The real CT in the treatment planning system was replaced with the pseudo CT, and the dose distribution was recalculated to determine the difference. Results: The atlas approach generally performed better than assigning a bulk CT number to the entire patient volume. Comparing atlas-based schemes, those using multiple atlases outperformed the single atlas scheme. For multiple atlas schemes, the pseudo CTs were similar to the real CTs (correlation coefficient, 0.787–0.819). The calculated dose distribution was in close agreement with the original dose. Nearly the entire patient volume (98.3%–98.7%) satisfied the criteria of chi-evaluation (<2% maximum dose and 2 mm range). The dose to 95% of the volume and the

  19. MRI-based treatment planning with pseudo CT generated through atlas registration

    Energy Technology Data Exchange (ETDEWEB)

    Uh, Jinsoo, E-mail: jinsoo.uh@stjude.org; Merchant, Thomas E.; Hua, Chiaho [Department of Radiological Sciences, St. Jude Children' s Research Hospital, Memphis, Tennessee 38105 (United States); Li, Yimei; Li, Xingyu [Department of Biostatistics, St. Jude Children' s Research Hospital, Memphis, Tennessee 38105 (United States)

    2014-05-15

    Purpose: To evaluate the feasibility and accuracy of magnetic resonance imaging (MRI)-based treatment planning using pseudo CTs generated through atlas registration. Methods: A pseudo CT, providing electron density information for dose calculation, was generated by deforming atlas CT images previously acquired on other patients. The authors tested 4 schemes of synthesizing a pseudo CT from single or multiple deformed atlas images: use of a single arbitrarily selected atlas, arithmetic mean process using 6 atlases, and pattern recognition with Gaussian process (PRGP) using 6 or 12 atlases. The required deformation for atlas CT images was derived from a nonlinear registration of conjugated atlas MR images to that of the patient of interest. The contrasts of atlas MR images were adjusted by histogram matching to reduce the effect of different sets of acquisition parameters. For comparison, the authors also tested a simple scheme assigning the Hounsfield unit of water to the entire patient volume. All pseudo CT generating schemes were applied to 14 patients with common pediatric brain tumors. The image similarity of real patient-specific CT and pseudo CTs constructed by different schemes was compared. Differences in computation times were also calculated. The real CT in the treatment planning system was replaced with the pseudo CT, and the dose distribution was recalculated to determine the difference. Results: The atlas approach generally performed better than assigning a bulk CT number to the entire patient volume. Comparing atlas-based schemes, those using multiple atlases outperformed the single atlas scheme. For multiple atlas schemes, the pseudo CTs were similar to the real CTs (correlation coefficient, 0.787–0.819). The calculated dose distribution was in close agreement with the original dose. Nearly the entire patient volume (98.3%–98.7%) satisfied the criteria of chi-evaluation (<2% maximum dose and 2 mm range). The dose to 95% of the volume and the

  20. Peripheral facial nerve dysfunction: CT evaluation

    Energy Technology Data Exchange (ETDEWEB)

    Disbro, M.A.; Harnsberger, H.R.; Osborn, A.G.

    1985-06-01

    Peripheral facial nerve dysfunction may have a clinically apparent or occult cause. The authors reviewed the clinical and radiographic records of 36 patients with peripheral facial nerve dysfunction to obtain information on the location of the suspected lesion and the number, sequence, and type of radiographic evaluations performed. Inadequate clinical evaluations before computed tomography (CT) was done and unnecessary CT examinations were also noted. They have suggested a practical clinical and radiographic scheme to evaluate progressive peripheral facial dysfunction with no apparent cause. If this scheme is applied, unnecessary radiologic tests and delays in diagnosis and treatment may be avoided.

  1. A Rapid Prototyping Environment for Wireless Communication Embedded Systems

    Directory of Open Access Journals (Sweden)

    Bryan A. Jones

    2003-05-01

    Full Text Available This paper introduces a rapid prototyping methodology which overcomes important barriers in the design and implementation of digital signal processing (DSP algorithms and systems on embedded hardware platforms, such as cellular phones. This paper describes rapid prototyping in terms of a simulation/prototype bridge and in terms of appropriate language design. The simulation/prototype bridge combines the strengths of simulation and of prototyping, allowing the designer to develop and evaluate next-generation communications systems, partly in simulation on a host computer and partly as a prototype on embedded hardware. Appropriate language design allows designers to express a communications system as a block diagram, in which each block represents an algorithm specified by a set of equations. Software tools developed for this paper implement both concepts, and have been successfully used in the development of a next-generation code division multiple access (CDMA cellular wireless communications system.

  2. Scheme for teleporting an unknown atomic state to any node in a quantum communication network

    Institute of Scientific and Technical Information of China (English)

    宋克慧; 张为俊; 郭光灿

    2002-01-01

    We propose a scheme for teleporting an unknown atomic state. In order to realize the teleportation to any node ina quantum communication network, an n-atom Greenberger-Horne-Zeilinger (GHZ) state is needed, which is utilizedas the quantum channel. From this n-atom GHZ state, two-node entanglement of processing and receiving teleportedstates can be obtained through the quantum logic gate manipulation. Finally, for the unequally weighted GHZ state,probabilistic teleportation is shown.

  3. Overloaded CDMA Systems with Displaced Binary Signatures

    Directory of Open Access Journals (Sweden)

    Vanhaverbeke Frederik

    2004-01-01

    Full Text Available We extend three types of overloaded CDMA systems, by displacing in time the binary signature sequences of these systems: (1 random spreading (PN, (2 multiple-OCDMA (MO, and (3 PN/OCDMA (PN/O. For each of these systems, we determine the time shifts that minimize the overall multiuser interference power. The achievable channel load with coded and uncoded data is evaluated for the conventional (without displacement and improved (with displacement systems, as well as for systems based on quasi-Welch-bound-equality (QWBE sequences, by means of several types of turbo detectors. For each system, the best performing turbo detector is selected in order to compare the performance of these systems. It is found that the improved systems substantially outperform their original counterparts. With uncoded data, (improved PN/O yields the highest acceptable channel load. For coded data, MO allows for the highest acceptable channel load over all considered systems, both for the conventional and the improved systems. In the latter case, channel loads of about 280% are achievable with a low degradation as compared to a single user system.

  4. Computationally Efficient Chaotic Spreading Sequence Selection for Asynchronous DS-CDMA

    Directory of Open Access Journals (Sweden)

    Litviņenko Anna

    2017-12-01

    Full Text Available The choice of the spreading sequence for asynchronous direct-sequence code-division multiple-access (DS-CDMA systems plays a crucial role for the mitigation of multiple-access interference. Considering the rich dynamics of chaotic sequences, their use for spreading allows overcoming the limitations of the classical spreading sequences. However, to ensure low cross-correlation between the sequences, careful selection must be performed. This paper presents a novel exhaustive search algorithm, which allows finding sets of chaotic spreading sequences of required length with a particularly low mutual cross-correlation. The efficiency of the search is verified by simulations, which show a significant advantage compared to non-selected chaotic sequences. Moreover, the impact of sequence length on the efficiency of the selection is studied.

  5. Asynchronous Free-Space Optical CDMA Communications System for Last-mile Access Network

    DEFF Research Database (Denmark)

    Jurado-Navas, Antonio; Raddo, Thiago R.; Sanches, Anderson L.

    2016-01-01

    We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed.......We propose a new hybrid asynchronous OCDMA-FSO communications system for access network solutions. New ABER expressions are derived under gamma-gamma scintillation channels, where all users can surprisingly achieve error-free transmissions when FEC is employed....

  6. A DUAL RESERVATION CDMA-BASED MAC PROTOCOL WITH POWER CONTROL FOR AD HOC NETWORKS

    Institute of Scientific and Technical Information of China (English)

    Jia Min; Chen Huimin; Yuan Yuhua

    2007-01-01

    This paper proposes a new multi-channel Medium Access Control (MAC) protocol named as Dual Reservation Code Division Multiple Access (CDMA) based MAC protocol with Power Control (DRCPC). The code channel is divided into common channel, broadcast channel and several data channels. And dynamic power control mechanism is implemented to reduce near-far interference. Compared with IEEE 802.11 Distributed Coordination Function (DCF) protocol, the results show that the proposed mechanism improves the average throughput and limits the transmission delay efficiently.

  7. Jammer Suppression in DS-CDMA Communications using Parafac-based Blind Separation

    Directory of Open Access Journals (Sweden)

    Xu Lingyun

    2016-01-01

    Full Text Available In this paper we propose to apply parafac-based source separation techniques for jammer suppression in direct spread spectrum communication systems. The jammer excision is formulated as an optimization problem and a new algorithm is presented which is based on the parafac tri-iterative least square algorithm. By jointly diagonalizing the time delay correlation matrix of the observed signals and using the new proposed method, a better solution is achieved. The proposed algorithm can successfully separate communication signals and jamming signals. Simulation results reveal that our proposed algorithm has the better blind signal separation performance than joint diagonalization method. Our proposed algorithm doesn’t require whitening processing. Moreover our proposed algorithm works well in the underdetermined condition, where the number of sources exceeds than the number of antennas.

  8. A new LDPC decoding scheme for PDM-8QAM BICM coherent optical communication system

    Science.gov (United States)

    Liu, Yi; Zhang, Wen-bo; Xi, Li-xia; Tang, Xian-feng; Zhang, Xiao-guang

    2015-11-01

    A new log-likelihood ratio (LLR) message estimation method is proposed for polarization-division multiplexing eight quadrature amplitude modulation (PDM-8QAM) bit-interleaved coded modulation (BICM) optical communication system. The formulation of the posterior probability is theoretically analyzed, and the way to reduce the pre-decoding bit error rate ( BER) of the low density parity check (LDPC) decoder for PDM-8QAM constellations is presented. Simulation results show that it outperforms the traditional scheme, i.e., the new post-decoding BER is decreased down to 50% of that of the traditional post-decoding algorithm.

  9. Secure DS-CDMA spreading codes using fully digital multidimensional multiscroll chaos

    KAUST Repository

    Mansingka, Abhinav S.

    2014-06-18

    This paper introduces a generalized fully digital hardware implementation of 1-D, 2-D and 3-D multiscroll chaos through sawtooth nonlinearities in a 3rd order ODE with the Euler approximation, wherein low-significance bits pass all NIST SP. 800-22 tests. The low-significance bits show good performance as spreading code for multiple-access DS-CDMA in AWGN and multipath environments, equivalent to Gold codes. This system capitalizes on complex nonlinear dynamics afforded by multiscroll chaos to provide higher security than conventional codes with the same BER performance demonstrated experimentally on a Xilinx Virtex 4 FPGA with logic utilization less than 1.25% and throughput up to 10.92 Gbits/s.

  10. Performance Analysis of Iterative Channel Estimation and Multiuser Detection in Multipath DS-CDMA Channels

    Science.gov (United States)

    Li, Husheng; Betz, Sharon M.; Poor, H. Vincent

    2007-05-01

    This paper examines the performance of decision feedback based iterative channel estimation and multiuser detection in channel coded aperiodic DS-CDMA systems operating over multipath fading channels. First, explicit expressions describing the performance of channel estimation and parallel interference cancellation based multiuser detection are developed. These results are then combined to characterize the evolution of the performance of a system that iterates among channel estimation, multiuser detection and channel decoding. Sufficient conditions for convergence of this system to a unique fixed point are developed.

  11. Diseño de una solución para el acceso de voz y datos utilizando la tecnología CDMA-450, provista por la Corporación Nacional de Telecomunicaciones CNT-EP para las zonas rurales de Yaruquí, Ascazubi y Santa Rosa de Cusubamba de la provincia de Pichincha

    OpenAIRE

    Peñaherrera Toledo, Andrés Patricio

    2015-01-01

    The rapid advancement of technology and communications has led to humans being increasingly reported globally, so the need to accommodate new users is critical for social development of a country. In the market many technologies are available to reach geographically distant areas of coverage areas network access. The CDMA platform is one of those through a licensing or authorization, a provider of telecommunications services, is the ability to use these services to provide voice and data acce...

  12. Genetic Local Search for Optimum Multiuser Detection Problem in DS-CDMA Systems

    Science.gov (United States)

    Wang, Shaowei; Ji, Xiaoyong

    Optimum multiuser detection (OMD) in direct-sequence code-division multiple access (DS-CDMA) systems is an NP-complete problem. In this paper, we present a genetic local search algorithm, which consists of an evolution strategy framework and a local improvement procedure. The evolution strategy searches the space of feasible, locally optimal solutions only. A fast iterated local search algorithm, which employs the proprietary characteristics of the OMD problem, produces local optima with great efficiency. Computer simulations show the bit error rate (BER) performance of the GLS outperforms other multiuser detectors in all cases discussed. The computation time is polynomial complexity in the number of users.

  13. [Mobile hospital -real time mobile telehealthcare system with ultrasound and CT van using high-speed satellite communication-].

    Science.gov (United States)

    Takizawa, Masaomi; Miyashita, Toyohisa; Murase, Sumio; Kanda, Hirohito; Karaki, Yoshiaki; Yagi, Kazuo; Ohue, Toru

    2003-01-01

    A real-time telescreening system is developed to detect early diseases for rural area residents using two types of mobile vans with a portable satellite station. The system consists of a satellite communication system with 1.5Mbps of the JCSAT-1B satellite, a spiral CT van, an ultrasound imaging van with two video conference system, a DICOM server and a multicast communication unit. The video image and examination image data are transmitted from the van to hospitals and the university simultaneously. Physician in the hospital observes and interprets exam images from the van and watches the video images of the position of ultrasound transducer on screenee in the van. After the observation images, physician explains a results of the examination by the video conference system. Seventy lung CT screening and 203 ultrasound screening were done from March to June 2002. The trial of this real time screening suggested that rural residents are given better healthcare without visit to the hospital. And it will open the gateway to reduce the medical cost and medical divide between city area and rural area.

  14. Reduced-Rank Chip-Level MMSE Equalization for the 3G CDMA Forward Link with Code-Multiplexed Pilot

    Directory of Open Access Journals (Sweden)

    Goldstein J Scott

    2002-01-01

    Full Text Available This paper deals with synchronous direct-sequence code-division multiple access (CDMA transmission using orthogonal channel codes in frequency selective multipath, motivated by the forward link in 3G CDMA systems. The chip-level minimum mean square error (MMSE estimate of the (multiuser synchronous sum signal transmitted by the base, followed by a correlate and sum, has been shown to perform very well in saturated systems compared to a Rake receiver. In this paper, we present the reduced-rank, chip-level MMSE estimation based on the multistage nested Wiener filter (MSNWF. We show that, for the case of a known channel, only a small number of stages of the MSNWF is needed to achieve near full-rank MSE performance over a practical single-to-noise ratio (SNR range. This holds true even for an edge-of-cell scenario, where two base stations are contributing near equal-power signals, as well as for the single base station case. We then utilize the code-multiplexed pilot channel to train the MSNWF coefficients and show that adaptive MSNWF operating in a very low rank subspace performs slightly better than full-rank recursive least square (RLS and significantly better than least mean square (LMS. An important advantage of the MSNWF is that it can be implemented in a lattice structure, which involves significantly less computation than RLS. We also present structured MMSE equalizers that exploit the estimate of the multipath arrival times and the underlying channel structure to project the data vector onto a much lower dimensional subspace. Specifically, due to the sparseness of high-speed CDMA multipath channels, the channel vector lies in the subspace spanned by a small number of columns of the pulse shaping filter convolution matrix. We demonstrate that the performance of these structured low-rank equalizers is much superior to unstructured equalizers in terms of convergence speed and error rates.

  15. Follow up CT of the patients who developed mental symptoms after direct operation of ruptured anterior communicating aneurysma

    International Nuclear Information System (INIS)

    Kitaoka, Kenichi; Nakagawa, Yoku; Abe, Hiroshi; Satoh, Masaharu; Miyasaka, Kazuo.

    1985-01-01

    The following conclusions were obtained from the analysis of CT findings of 26 cases with ruptured anterior communicating aneurysm showed postoperative mental symptoms. 1) Many cases with diffuse and symmetrical high density in subarachnoid spaces on CT in the acute stage, showed severe mental symptoms in the chronic stage. In particular, serious mental symptoms of the chronic stage were recognized in cases with high density in not only subarachnoid space but also in brain tissues and ventricles. 2) Mental symptoms of the chronic stage were severe in cases showed relatively large low density area and with low density in frontal lobe. (author)

  16. Fresh Prime Codes Evaluation for Synchronous PPM and OPPM Signaling for Optical CDMA Networks

    Science.gov (United States)

    Karbassian, M. Massoud; Ghafouri-Shiraz, H.

    2007-06-01

    In this paper, we have proposed a novel prime spreading sequence family hereby referred to as “Double-Padded Modified Prime Code (DPMPC)” for direct-detection synchronous optical code-division multiple-access (OCDMA) networks. The new code is applied to both pulse-position and overlapping pulse-position modulation CDMA networks, and their performances were evaluated and compared with existing prime codes family. In addition, we have analyzed the system throughput and also introduced a new interference cancellation technique which significantly improves the bit error probability of OCDMA networks.

  17. Perbandingan Perhitungan Trafik Jam Sibuk CDMA 2000 1x pada BTS Inner City dan BTS Outer City dengan Mempergunakan Metode ADPH, TCBH, FDMH dan FDMP

    Directory of Open Access Journals (Sweden)

    Eka Wahyudi

    2013-11-01

    Full Text Available Cellular communication system is a wireless communication system where the subscriber can move within a wide network coverage. Code Division Multiple Access (CDMA is a multiuser access technology that is each user uses a unique code contained in the access channel in the system. Calculation and determination of peak hours can be done by several methods such as: Average Daily Peak Hour (ADPH, Time Consistent Busy Hour (TCBH, Fixed Daily Measurement Hour (FDMH, Fixed Daily Measurement Period (FDMP. The effectiveness of the channel should be determined by occupancy both at inner city territory and outer city  territory location. Using design Erlang (Erl for supply channel at Base Transceiver Station (BTS that provided, BTS has a design Erlang of 369,83 Erl at inner city and it has a design Erlang of 241,8 Erl at outer city. Peak hour on the inner city occurred at 12:00 to 15:00, whereas the outer city of peak hour occurred at 18:00 to 21:00. Effectiveness value that determined by operator are : 70% = high occupancy (very effective. In this case occupancy values obtained in each method is between 21% to 69% which means effective

  18. CT liver volumetry using geodesic active contour segmentation with a level-set algorithm

    Science.gov (United States)

    Suzuki, Kenji; Epstein, Mark L.; Kohlbrenner, Ryan; Obajuluwa, Ademola; Xu, Jianwu; Hori, Masatoshi; Baron, Richard

    2010-03-01

    Automatic liver segmentation on CT images is challenging because the liver often abuts other organs of a similar density. Our purpose was to develop an accurate automated liver segmentation scheme for measuring liver volumes. We developed an automated volumetry scheme for the liver in CT based on a 5 step schema. First, an anisotropic smoothing filter was applied to portal-venous phase CT images to remove noise while preserving the liver structure, followed by an edge enhancer to enhance the liver boundary. By using the boundary-enhanced image as a speed function, a fastmarching algorithm generated an initial surface that roughly estimated the liver shape. A geodesic-active-contour segmentation algorithm coupled with level-set contour-evolution refined the initial surface so as to more precisely fit the liver boundary. The liver volume was calculated based on the refined liver surface. Hepatic CT scans of eighteen prospective liver donors were obtained under a liver transplant protocol with a multi-detector CT system. Automated liver volumes obtained were compared with those manually traced by a radiologist, used as "gold standard." The mean liver volume obtained with our scheme was 1,520 cc, whereas the mean manual volume was 1,486 cc, with the mean absolute difference of 104 cc (7.0%). CT liver volumetrics based on an automated scheme agreed excellently with "goldstandard" manual volumetrics (intra-class correlation coefficient was 0.95) with no statistically significant difference (p(F<=f)=0.32), and required substantially less completion time. Our automated scheme provides an efficient and accurate way of measuring liver volumes.

  19. Application of Super-Resolution Convolutional Neural Network for Enhancing Image Resolution in Chest CT.

    Science.gov (United States)

    Umehara, Kensuke; Ota, Junko; Ishida, Takayuki

    2017-10-18

    In this study, the super-resolution convolutional neural network (SRCNN) scheme, which is the emerging deep-learning-based super-resolution method for enhancing image resolution in chest CT images, was applied and evaluated using the post-processing approach. For evaluation, 89 chest CT cases were sampled from The Cancer Imaging Archive. The 89 CT cases were divided randomly into 45 training cases and 44 external test cases. The SRCNN was trained using the training dataset. With the trained SRCNN, a high-resolution image was reconstructed from a low-resolution image, which was down-sampled from an original test image. For quantitative evaluation, two image quality metrics were measured and compared to those of the conventional linear interpolation methods. The image restoration quality of the SRCNN scheme was significantly higher than that of the linear interpolation methods (p < 0.001 or p < 0.05). The high-resolution image reconstructed by the SRCNN scheme was highly restored and comparable to the original reference image, in particular, for a ×2 magnification. These results indicate that the SRCNN scheme significantly outperforms the linear interpolation methods for enhancing image resolution in chest CT images. The results also suggest that SRCNN may become a potential solution for generating high-resolution CT images from standard CT images.

  20. Utilization of symmetrical components in a communication-assisted protection scheme for radial MV feeders with variable or reduced short-circuit currents

    DEFF Research Database (Denmark)

    Ciontea, Catalin-Iosif; Bak, Claus Leth; Blaabjerg, Frede

    2017-01-01

    because the fault current is significantly lower in the islanded mode compared to the grid-connected mode and consequently a single set of settings for the OC relays is not sufficient. This paper propose a communication-assisted protection scheme that is able to operate correctly in a radial Medium...... over positive-sequence current, while the relays placed downstream the fault detect a zero magnitude for their corresponding ratios. Protection relays calculate the magnitude of the proposed ratio and then exchange the obtained value with the adjacent upstream relays using communication. Therefore......, each relay would have access to its own ratio and to the ratio provided by the adjacent relay. Finally, the relay with the highest calculated magnitude of the ratio of zero-sequence to positive-sequence current will trip, thus clearing the fault. The new protection scheme is implemented in a test...

  1. Ber analysis of iterative turbo encoded miso wireless communication system under implementation of q-ostbc scheme

    OpenAIRE

    Kabir, M. Hasnat; Ullah, Shaikh Enayet; Zaman, Mustari; Rashed, Md. Golam

    2012-01-01

    In this paper, a comprehensive study has been made to evaluate the performance of a MISO wireless communication system. The 4-by-1 spatially multiplexed Turbo encoded system under investigation incorporates Quasi-orthogonal space-time block coding (Q-STBC) and ML signal detection schemes under QPSK, QAM, 16PSK and 16QAM digital modulations. The simulation results elucidate that a significant improvement of system performance is achieved in QAM modulation. The results are also indicative of no...

  2. The communication of the radiation risk from CT in relation to its clinical benefit in the era of personalized medicine. Pt. 1. The radiation risk from CT

    Energy Technology Data Exchange (ETDEWEB)

    Westra, Sjirk J. [Massachusetts General Hospital, Division of Pediatric Radiology, Boston, MA (United States)

    2014-10-15

    The theory of radiation carcinogenesis has been debated for decades. Most estimates of the radiation risks from CT have been based on extrapolations from the lifespan follow-up study of atomic bomb survivors and on follow-up studies after therapeutic radiation, using the linear no-threshold theory. Based on this, many population-based projections of induction of future cancers by CT have been published that should not be used to estimate the risk to an individual because of their large margin of error. This has changed recently with the publication of three large international cohort follow-up studies, which link observed cancers to CT scans received in childhood. A fourth ongoing multi-country study in Europe is expected to have enough statistical power to address the limitations of the prior studies. The United Nations Scientific Committee on the Effects of Atomic Radiation (UNSCEAR) report released in 2013 specifically addresses variability in response of the pediatric population exposed to ionizing radiation. Most authorities now conclude that there is enough evidence to link future cancers to the radiation exposure from a single CT scan in childhood but that cancer risk estimates for individuals must be based on the specifics of exposure, age at exposure and absorbed dose to certain tissues. Generalizations are not appropriate, and the communication of the CT risk to individuals should be conducted within the framework of personalized medicine. (orig.)

  3. Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue

    Science.gov (United States)

    Shukla, Chitra; Thapliyal, Kishore; Pathak, Anirban

    2017-12-01

    Semi-quantum protocols that allow some of the users to remain classical are proposed for a large class of problems associated with secure communication and secure multiparty computation. Specifically, first-time semi-quantum protocols are proposed for key agreement, controlled deterministic secure communication and dialogue, and it is shown that the semi-quantum protocols for controlled deterministic secure communication and dialogue can be reduced to semi-quantum protocols for e-commerce and private comparison (socialist millionaire problem), respectively. Complementing with the earlier proposed semi-quantum schemes for key distribution, secret sharing and deterministic secure communication, set of schemes proposed here and subsequent discussions have established that almost every secure communication and computation tasks that can be performed using fully quantum protocols can also be performed in semi-quantum manner. Some of the proposed schemes are completely orthogonal-state-based, and thus, fundamentally different from the existing semi-quantum schemes that are conjugate coding-based. Security, efficiency and applicability of the proposed schemes have been discussed with appropriate importance.

  4. On Several Fundamental Problems of Optimization, Estimation, and Scheduling in Wireless Communications

    Science.gov (United States)

    Gao, Qian

    For both the conventional radio frequency and the comparably recent optical wireless communication systems, extensive effort from the academia had been made in improving the network spectrum efficiency and/or reducing the error rate. To achieve these goals, many fundamental challenges such as power efficient constellation design, nonlinear distortion mitigation, channel training design, network scheduling and etc. need to be properly addressed. In this dissertation, novel schemes are proposed accordingly to deal with specific problems falling in category of these challenges. Rigorous proofs and analyses are provided for each of our work to make a fair comparison with the corresponding peer works to clearly demonstrate the advantages. The first part of this dissertation considers a multi-carrier optical wireless system employing intensity modulation (IM) and direct detection (DD). A block-wise constellation design is presented, which treats the DC-bias that conventionally used solely for biasing purpose as an information basis. Our scheme, we term it MSM-JDCM, takes advantage of the compactness of sphere packing in a higher dimensional space, and in turn power efficient constellations are obtained by solving an advanced convex optimization problem. Besides the significant power gains, the MSM-JDCM has many other merits such as being capable of mitigating nonlinear distortion by including a peak-to-power ratio (PAPR) constraint, minimizing inter-symbol-interference (ISI) caused by frequency-selective fading with a novel precoder designed and embedded, and further reducing the bit-error-rate (BER) by combining with an optimized labeling scheme. The second part addresses several optimization problems in a multi-color visible light communication system, including power efficient constellation design, joint pre-equalizer and constellation design, and modeling of different structured channels with cross-talks. Our novel constellation design scheme, termed CSK-Advanced, is

  5. Exploiting Phase Diversity for CDMA2000 1X Smart Antenna Base Stations

    Science.gov (United States)

    Kim, Seongdo; Hyeon, Seungheon; Choi, Seungwon

    2004-12-01

    A performance analysis of an access channel decoder is presented which exploits a diversity gain due to the independent magnitude of received signals energy at each of the antenna elements of a smart-antenna base-station transceiver subsystem (BTS) operating in CDMA2000 1X signal environment. The objective is to enhance the data retrieval at cellsite during the access period, for which the optimal weight vector of the smart antenna BTS is not available. It is shown in this paper that the access channel decoder proposed in this paper outperforms the conventional one, which is based on a single antenna channel in terms of detection probability of access probe, access channel failure probability, and Walsh-code demodulation performance.

  6. Cancelable remote quantum fingerprint templates protection scheme

    International Nuclear Information System (INIS)

    Liao Qin; Guo Ying; Huang Duan

    2017-01-01

    With the increasing popularity of fingerprint identification technology, its security and privacy have been paid much attention. Only the security and privacy of biological information are insured, the biological technology can be better accepted and used by the public. In this paper, we propose a novel quantum bit (qbit)-based scheme to solve the security and privacy problem existing in the traditional fingerprint identification system. By exploiting the properties of quantm mechanics, our proposed scheme, cancelable remote quantum fingerprint templates protection scheme, can achieve the unconditional security guaranteed in an information-theoretical sense. Moreover, this novel quantum scheme can invalidate most of the attacks aimed at the fingerprint identification system. In addition, the proposed scheme is applicable to the requirement of remote communication with no need to worry about its security and privacy during the transmission. This is an absolute advantage when comparing with other traditional methods. Security analysis shows that the proposed scheme can effectively ensure the communication security and the privacy of users’ information for the fingerprint identification. (paper)

  7. History of Antenna Technology for Mobile Communications in Korea

    Science.gov (United States)

    Min, Kyeong-Sik; Park, Chul-Keun; Kang, Suk-Youb

    In this paper, we discuss the development of wireless and mobile communications in Korea, current technological trends, and the future outlook on technological developments. Since the introduction of the telegraph and the telephone in September 1885, Korea's wired and wireless communications industry has consistently developed for over 100 years. Since 1984, upon the provision of the mobile telecommunications service, the industry has seen drastic qualitative and quantitative growth in terms of both technical and economic aspects, which played a crucial role in the rapid growth of the digital industry in Korea. After the era of the analog cellular service based on the Advanced Mobile Phone System (AMPS), a precursor to the modern mobile service, Korea became the world's first country to commercialize Code Division Multiple Access (CDMA) in 1996 and succeeded in commercializing CDMA 2000 lx (IMT 2000) in 2001. With further developments in the mobile communication technology, the technology for antennas also saw drastic advancements. As the mobile antennas moved from the second to the third generation, they grew from external models to very small internal models. At the same time, they evolved into highly functional and high performance multiple band and wide band antennas. Furthermore, Korea was the first country to commercialize and offer the Wireless Broadband Internet (WiBro) service in 2006. By leading the wireless communications standardization and exerting remarkable efforts in research and development, Korea is consolidating its status as an Information Technology (IT) leader in the global market. The antenna's inherent importance will be further emphasized in the near future as it satisfies the performance and structural needs of portable terminals necessary for realizing the projected establishment of the ubiquitous world. It is thought that antenna technologies will not be limited to simple concepts as previously experienced but will utilize various kinds

  8. Pilot power based rate control in CDMA 2000 1x EV-DO Rev-A

    Institute of Scientific and Technical Information of China (English)

    LIU Xiao-feng; GU Jian; YANG Hong-wen

    2008-01-01

    This article proposes a new algorithm to improvethe rate control efficiency of enhanced reverse link mediumaccess control (RLMAC) in the code division multiple access(CDMA) lx EV-DO release A(Rev. A) system. The newalgorithm brings reverse access terminal (AT) pilot power tothe RLMAC rate control procedure and makes it easier for alow pilot power user to increase its data rate when the systemis slightly loaded and harder to decrease its date rate when thesystem is heavily loaded. Numerical results of system levelsimulations show that the new algorithm can bring highersystem throughput, lower AT transmission power, and lowersystem load.

  9. Improving Multi Access Interference Suppression in Optical CDMA by using all-Optical Signal Processing

    Directory of Open Access Journals (Sweden)

    T. B. Osadola

    2013-06-01

    Full Text Available This paper presents the study of a novel all-optical method for processing optical CDMA signals towards improving suppression of multi access interference. The main focus is on incoherent OCDMA systems using multiwavelength 2D-WH/TS codes generated using FBG based encoders and decoders. The MAI suppression capabilities based on its ability to eliminate selective wavelength pulse processing have been shown. A novel transmitter architecture that achieves up to 3dB power saving was also presented. As a result of hardware savings, processing cost will be significantly reduced and power budget improvement resulted in improved performance.

  10. Performance Analysis for Bit Error Rate of DS- CDMA Sensor Network Systems with Source Coding

    Directory of Open Access Journals (Sweden)

    Haider M. AlSabbagh

    2012-03-01

    Full Text Available The minimum energy (ME coding combined with DS-CDMA wireless sensor network is analyzed in order to reduce energy consumed and multiple access interference (MAI with related to number of user(receiver. Also, the minimum energy coding which exploits redundant bits for saving power with utilizing RF link and On-Off-Keying modulation. The relations are presented and discussed for several levels of errors expected in the employed channel via amount of bit error rates and amount of the SNR for number of users (receivers.

  11. SU-E-T-58: A Novel Monte Carlo Photon Transport Simulation Scheme and Its Application in Cone Beam CT Projection Simulation

    International Nuclear Information System (INIS)

    Xu, Y; Tian, Z; Jiang, S; Jia, X; Zhou, L

    2015-01-01

    Purpose: Monte Carlo (MC) simulation is an important tool to solve radiotherapy and medical imaging problems. Low computational efficiency hinders its wide applications. Conventionally, MC is performed in a particle-by -particle fashion. The lack of control on particle trajectory is a main cause of low efficiency in some applications. Take cone beam CT (CBCT) projection simulation as an example, significant amount of computations were wasted on transporting photons that do not reach the detector. To solve this problem, we propose an innovative MC simulation scheme with a path-by-path sampling method. Methods: Consider a photon path starting at the x-ray source. After going through a set of interactions, it ends at the detector. In the proposed scheme, we sampled an entire photon path each time. Metropolis-Hasting algorithm was employed to accept/reject a sampled path based on a calculated acceptance probability, in order to maintain correct relative probabilities among different paths, which are governed by photon transport physics. We developed a package gMMC on GPU with this new scheme implemented. The performance of gMMC was tested in a sample problem of CBCT projection simulation for a homogeneous object. The results were compared to those obtained using gMCDRR, a GPU-based MC tool with the conventional particle-by-particle simulation scheme. Results: Calculated scattered photon signals in gMMC agreed with those from gMCDRR with a relative difference of 3%. It took 3.1 hr. for gMCDRR to simulate 7.8e11 photons and 246.5 sec for gMMC to simulate 1.4e10 paths. Under this setting, both results attained the same ∼2% statistical uncertainty. Hence, a speed-up factor of ∼45.3 was achieved by this new path-by-path simulation scheme, where all the computations were spent on those photons contributing to the detector signal. Conclusion: We innovatively proposed a novel path-by-path simulation scheme that enabled a significant efficiency enhancement for MC particle

  12. SU-E-T-58: A Novel Monte Carlo Photon Transport Simulation Scheme and Its Application in Cone Beam CT Projection Simulation

    Energy Technology Data Exchange (ETDEWEB)

    Xu, Y [UT Southwestern Medical Center, Dallas, TX (United States); Southern Medical University, Guangzhou (China); Tian, Z; Jiang, S; Jia, X [UT Southwestern Medical Center, Dallas, TX (United States); Zhou, L [Southern Medical University, Guangzhou (China)

    2015-06-15

    Purpose: Monte Carlo (MC) simulation is an important tool to solve radiotherapy and medical imaging problems. Low computational efficiency hinders its wide applications. Conventionally, MC is performed in a particle-by -particle fashion. The lack of control on particle trajectory is a main cause of low efficiency in some applications. Take cone beam CT (CBCT) projection simulation as an example, significant amount of computations were wasted on transporting photons that do not reach the detector. To solve this problem, we propose an innovative MC simulation scheme with a path-by-path sampling method. Methods: Consider a photon path starting at the x-ray source. After going through a set of interactions, it ends at the detector. In the proposed scheme, we sampled an entire photon path each time. Metropolis-Hasting algorithm was employed to accept/reject a sampled path based on a calculated acceptance probability, in order to maintain correct relative probabilities among different paths, which are governed by photon transport physics. We developed a package gMMC on GPU with this new scheme implemented. The performance of gMMC was tested in a sample problem of CBCT projection simulation for a homogeneous object. The results were compared to those obtained using gMCDRR, a GPU-based MC tool with the conventional particle-by-particle simulation scheme. Results: Calculated scattered photon signals in gMMC agreed with those from gMCDRR with a relative difference of 3%. It took 3.1 hr. for gMCDRR to simulate 7.8e11 photons and 246.5 sec for gMMC to simulate 1.4e10 paths. Under this setting, both results attained the same ∼2% statistical uncertainty. Hence, a speed-up factor of ∼45.3 was achieved by this new path-by-path simulation scheme, where all the computations were spent on those photons contributing to the detector signal. Conclusion: We innovatively proposed a novel path-by-path simulation scheme that enabled a significant efficiency enhancement for MC particle

  13. Optimization of hybrid token-CDMA MAC system using cross-layer information

    CSIR Research Space (South Africa)

    Liu, I-S

    2007-08-01

    Full Text Available The hybrid MAC scheme is capable to implement in either ad hoc or wireless mesh networks (WMN). For WMN configuration, stations are served as access networks utilizing non-mobile relaying nodes to provide wireless backbone services for nomadic users... University and a PhD degree from University of Cambridge, United Kingdom. His research interests are in the general areas of adaptive signal processing, digital and wireless communications and data networks. Co-author: Professor Hong-Jun Xu...

  14. Aortic non communicating dissections. A study with helical CT

    International Nuclear Information System (INIS)

    Midiri, M.; Strada, A.; Stabile Ianora, A.A.; Rotondo, A.; Angelelli, G.; D'Agostino, D.; De Luca Tupputi Schinosa, L.

    2000-01-01

    The evaluate the signs of aortic intramural hematoma with helical CT and the diagnostic role of this technique in patients with this condition. It was reviewed the CT findings of 396 patients submitted to emergency examinations for suspected aortic dissection from 1995 to 1999. Only 18 patients (6 women and 12 men) had CT signs of aortic intramural hematoma. Helical CT studies were carried out with the following parameters: slice thickness 10 mm, reconstruction index 10, feed 1.5 mm, conventional algorithm with minimum values of 130 kV and 125mA. All patients were examined with dynamic contrast-enhanced CT, before and after a power injection of 130 mL ionic contrast material. It was studied: hematoma localization and longitudinal extension; thickness and density of aortic wall; presence and location of intimal calcifications; integrity of intimal wall; hemo mediastinum and/or hemo thorax. Aortic wall thickening appeared as a high density crescent-shaped area at baseline CT and had low density on enhanced images in all patients. Thickening was eccentric in 14/18 patients and concentric in 4/18 only; it always exceeded 4 mm. It was found some intimal calcifications in 8 patients and hemo thorax and/or hemo mediastinum in 9 patients. A patient with type A hematoma died of cardiac tamponade a few hours after CT diagnosis. Six patients (5 type B and 1 type A) underwent anti-hypertensive treatment and radiological follow-up. Eleven patients (6 type A and 5 type B) underwent prosthesis replacement and 5 of them (3 type A and 2 type B) died of postoperative complications. In the 5 type B patients surgery was performed because of treatment-resistant pain and of the onset of ischemic complications to abdominal organs caused by involvement of the main collateral branches of the aorta. One patient with type A hematoma was submitted to drug treatment because it was judged unresectable. Intramural hematoma of the aorta is a distinct pathological entity, which should not be

  15. CT myelography in communicating syringomyelia

    International Nuclear Information System (INIS)

    Pamir, M.N.; Ozer, A.F.; Zirh, T.A.; Gurmen, N.; Erzen, C.

    1991-01-01

    Although the etiology of syringomyelia is not clearly understood, many surgical methods have been proposed for its treatment. One widely used technique in cases of communicating syringomyelia is that of posterior fossa decompression and plugging of the obex (Gardner's Operation). In this paper 5 cases of syringomyelia are presented which were investigated using detailed myelo-computerized tomographic techniques, of which 2 appeared to be communicating syringomyelia and which were treated by posterior fossa decompression and obex plugging. The authors also discuss the place of computed tomography in the differential diagnosis of communicating syringomyelia. (author). 42 refs.; 3 figs.; 2 tabs

  16. Effects of information, education, and communication campaign on a community-based health insurance scheme in Burkina Faso.

    Science.gov (United States)

    Cofie, Patience; De Allegri, Manuela; Kouyaté, Bocar; Sauerborn, Rainer

    2013-12-06

    The study analysed the effect of Information, Education, and Communication (IEC) campaign activities on the adoption of a community-based health insurance (CHI) scheme in Nouna, Burkina Faso. It also identified the factors that enhanced or limited the campaign's effectiveness. Complementary data collection approaches were used. A survey was conducted with 250 randomly selected household heads, followed by in-depth interviews with 22 purposively selected community leaders, group discussions with the project management team, and field observations. Bivariate analysis and multivariate logistic regression models were used to assess the association between household exposure to campaign and acquisition of knowledge as well as household exposure to campaign and enrolment. The IEC campaign had a positive effect on households' knowledge about the CHI and to a lesser extent on household enrolment in the scheme. The effectiveness of the IEC strategy was mainly influenced by: (1) frequent and consistent IEC messages from multiple media channels (mass and interpersonal channels), including the radio, a mobile information van, and CHI team, and (2) community heads' participation in the CHI scheme promotion. Education was the only significantly influential socio-demographic determinant of knowledge and enrolment among household heads. The relatively low effects of the IEC campaign on CHI enrolment are indicative of other important IEC mediating factors, which should be taken into account in future CHI campaign evaluation. The study concludes that an IEC campaign is crucial to improving the understanding of the CHI scheme concept, which is an enabler to enrolment, and should be integrated into scheme designs and evaluations.

  17. Effects of information, education, and communication campaign on a community-based health insurance scheme in Burkina Faso

    Directory of Open Access Journals (Sweden)

    Patience Cofie

    2013-12-01

    Full Text Available Objective : The study analysed the effect of Information, Education, and Communication (IEC campaign activities on the adoption of a community-based health insurance (CHI scheme in Nouna, Burkina Faso. It also identified the factors that enhanced or limited the campaign's effectiveness. Design : Complementary data collection approaches were used. A survey was conducted with 250 randomly selected household heads, followed by in-depth interviews with 22 purposively selected community leaders, group discussions with the project management team, and field observations. Bivariate analysis and multivariate logistic regression models were used to assess the association between household exposure to campaign and acquisition of knowledge as well as household exposure to campaign and enrolment. Results : The IEC campaign had a positive effect on households’ knowledge about the CHI and to a lesser extent on household enrolment in the scheme. The effectiveness of the IEC strategy was mainly influenced by: 1 frequent and consistent IEC messages from multiple media channels (mass and interpersonal channels, including the radio, a mobile information van, and CHI team, and 2 community heads’ participation in the CHI scheme promotion. Education was the only significantly influential socio-demographic determinant of knowledge and enrolment among household heads. The relatively low effects of the IEC campaign on CHI enrolment are indicative of other important IEC mediating factors, which should be taken into account in future CHI campaign evaluation. Conclusion : The study concludes that an IEC campaign is crucial to improving the understanding of the CHI scheme concept, which is an enabler to enrolment, and should be integrated into scheme designs and evaluations.

  18. The Most Possible Scheme of Joint Service Detection for the Next Wireless Communication Technologies

    Directory of Open Access Journals (Sweden)

    Firdaus Firdaus

    2013-03-01

    Full Text Available The era of beyond third generation wireless communication is highly heterogeneous in that it comprises several radio access technologies that need to be joined into a single multimode terminal. In this respect, this paper introduces a common service recognition system for the next wireless communication technologies i.e. Long Term Evolution (LTE, WiMAX or IEEE 802.16, and Wireless Local Area Network (WLAN or IEEE 802.11. It is done in physical layer as one of multimode terminal ability regardless network cooperation existence. We investigated on the preamble and synchronization signals as indicators of the available services instead of carrier frequency detection. To detect these signals, we proposed a time domain detection system consisting of auto-correlation, cross-correlation, and a peak period detection. Based on complexity analysis, this paper proposes the most possible scheme with lower complexity than cross-correlation implementation. Moreover, the fixed point simulation results show that the proposed system satisfies the minimum receiver sensitivity requirements that specified in the standards.

  19. Exploiting Phase Diversity for CDMA2000 1X Smart Antenna Base Stations

    Directory of Open Access Journals (Sweden)

    Hyeon Seungheon

    2004-01-01

    Full Text Available A performance analysis of an access channel decoder is presented which exploits a diversity gain due to the independent magnitude of received signals energy at each of the antenna elements of a smart-antenna base-station transceiver subsystem (BTS operating in CDMA2000 1X signal environment. The objective is to enhance the data retrieval at cellsite during the access period, for which the optimal weight vector of the smart antenna BTS is not available. It is shown in this paper that the access channel decoder proposed in this paper outperforms the conventional one, which is based on a single antenna channel in terms of detection probability of access probe, access channel failure probability, and Walsh-code demodulation performance.

  20. Communication Technology: Pros and Cons of Constant Connection to Work

    Science.gov (United States)

    Diaz, Ismael; Chiaburu, Dan S.; Zimmerman, Ryan D.; Boswell, Wendy R.

    2012-01-01

    We examined the relationship between employees' attitudes related to communication technology (CT) flexibility, communication technology (CT) use, work-to-life conflict and work satisfaction. Based on data obtained from 193 employees, CT flexibility predicted more CT use. Further, CT use was associated not only with increased work satisfaction,…

  1. On Performance of Linear Multiuser Detectors for Wireless Multimedia Applications

    Science.gov (United States)

    Agarwal, Rekha; Reddy, B. V. R.; Bindu, E.; Nayak, Pinki

    In this paper, performance of different multi-rate schemes in DS-CDMA system is evaluated. The analysis of multirate linear multiuser detectors with multiprocessing gain is analyzed for synchronous Code Division Multiple Access (CDMA) systems. Variable data rate is achieved by varying the processing gain. Our conclusion is that bit error rate for multirate and single rate systems can be made same with a tradeoff with number of users in linear multiuser detectors.

  2. PERILAKU KONSUMEN DALAM MEMILIH JASA LAYANAN OPERATOR MOBILE PHONE YANG BERBASIS CDMA DAN GSM (Studi pada Pelajar dan Mahasiswa Kelompok N-Gens di Kota Malang dari Perpektif Stratejik

    Directory of Open Access Journals (Sweden)

    Demitri Marvin Kadhaffi

    2012-05-01

    Full Text Available ABSTRAKS Tujuan penelitian ini adalah (1 menganalisis faktor-faktor yang dipertimbangkan konsumen dalam memilih suatu jasa layanan operator mobile phone (baik CDMA maupun GSM, (2 menganalsis variabel dominan yang mempengaruhi perilaku konsumen dalam memilih jasa layanan operator Jenis penelitian ini adalah applied research dengan metode penelitian studi kausal. Penelitian ini ditujukan pada segmen pelajar dan mahasiswa di Kota Malang yang termasuk kelompok Net Generations (yang lahir antara tahun 1977-1997 dengan batas minimal umur untuk responden adalah 17 tahun.  Kerangka Sampel untuk penelitian ini adalah pengguna kartu CDMA dan GSM sebanyak 175 responden. Tehnik Sampling yang digunakan adalah desain sampel non probability dengan metode purposive sample yang kedua yaitu quota sampling. Metode analisa data yang digunakan adalah analisa faktor dan analisa diskriminan Hasil analisa faktor terhadap 34 variabel diperoleh  7 faktor baru, yang diberi label sebagai berikut : (1 faktor citra produk (2 faktor pelayanan, (3 faktor pengaruh lingkungan, (4 faktor promosi,(5 faktor individual, (6 faktor harga, dan (7 faktor proses. Dari analisa diskriminan diperoleh hasil yang bertentangan dengan hipotesis yaitu ternyata variabel harga bukan merupakan variabel yang dominan dalam membedakan perilaku pelanggan operator CDMA dengan GSM. Mereka lebih sensitif terhadap proses produk. Hal ini mengarahkan pelanggan untuk kalangan pelajar dan mahasiswa sebagai kelompok smart. Hasil penelitian menyimpulkan bahwa untuk membangun keunggulan bersaing operator harus meraih keunggulan posisional melalui diferensiasi “content” jasa yang dihasilkan yaitu berupa proses, sebagai hasil dari aplikasi  positioning produk.   Kata kunci: perilaku konsumen, jasa layanan, mobile phone       ABSTRACT An objective of this research is to (1 identify factors that customer consider in choosing mobile phone operator service (whether CDMA and GSM, (2 identify dominant variable

  3. Full-Duplex Airborne Ultrasonic Data Communication Using a Pilot-Aided QAM-OFDM Modulation Scheme.

    Science.gov (United States)

    Jiang, Wentao; Wright, William M D

    2016-08-01

    Orthogonal frequency division multiplexing (OFDM) has been extensively used in a variety of broadband digital wireless communications applications because of its high bandwidth utilization efficiency and effective immunity to multipath distortion. This paper has investigated quadrature amplitude modulation and OFDM methods in air-coupled ultrasonic communication, using broadband capacitive ultrasonic transducers with high- k dielectric layers. OFDM phase noise was discussed and corrected using a pilot-aided estimation algorithm. The overall system data rate achieved was up to 400 kb/s with a spectral efficiency of 2 b/s/Hz. An ultrasonic propagation model for signal prediction considered atmospheric absorption of sound in air, beam divergence, and transducer frequency response. The simulations were compared with the experimental results, and good agreement was found between the two. Two-way communication through air was also implemented successfully by applying three-way handshaking initialization and an adaptive modulation scheme with variable data rates depending on the transmission distance, estimated using received signal strength indication measurement. It was shown that the error-free transmission range could be extended up to 2.5 m using different system transfer rates from 400 kb/s down to 100 kb/s. In full-duplex transmission mode, the overall error-free system data rate achieved was 0.8 Mb/s up to 1.5 m.

  4. Towards an inline reconstruction architecture for micro-CT systems

    International Nuclear Information System (INIS)

    Brasse, David; Humbert, Bernard; Mathelin, Carole; Rio, Marie-Christine; Guyonnet, Jean-Louis

    2005-01-01

    Recent developments in micro-CT have revolutionized the ability to examine in vivo living experimental animal models such as mouse with a spatial resolution less than 50 μm. The main requirements of in vivo imaging for biological researchers are a good spatial resolution, a low dose induced to the animal during the full examination and a reduced acquisition and reconstruction time for screening purposes. We introduce inline acquisition and reconstruction architecture to obtain in real time the 3D attenuation map of the animal fulfilling the three previous requirements. The micro-CT system is based on commercially available x-ray detector and micro-focus x-ray source. The reconstruction architecture is based on a cluster of PCs where a dedicated communication scheme combining serial and parallel treatments is implemented. In order to obtain high performance transmission rate between the detector and the reconstruction architecture, a dedicated data acquisition system is also developed. With the proposed solution, the time required to filter and backproject a projection of 2048 x 2048 pixels inside a volume of 140 mega voxels using the Feldkamp algorithm is similar to 500 ms, the time needed to acquire the same projection

  5. An Antenna Diversity Scheme for Digital Front-End with OFDM Technology

    Institute of Scientific and Technical Information of China (English)

    Fa-Long Luol; Ward Williams; Bruce Gladstone

    2011-01-01

    In,this paper, we propose a new antenna diversity scheme for OFDM-based wireless communication and digital broadcasting applications. Compared with existing schemes, such as post-fast Fourier transform (FFT), pre-FFT, and polyphase-based fitter-bank, the proposed scheme performs optimally and has very low computational complexity. It offers a better compromise between performance, power consumption, and complexity in real-time implementation of the receivers of broadband communication and digital broadcasting systems.

  6. Two-Stage Maximum Likelihood Estimation (TSMLE for MT-CDMA Signals in the Indoor Environment

    Directory of Open Access Journals (Sweden)

    Sesay Abu B

    2004-01-01

    Full Text Available This paper proposes a two-stage maximum likelihood estimation (TSMLE technique suited for multitone code division multiple access (MT-CDMA system. Here, an analytical framework is presented in the indoor environment for determining the average bit error rate (BER of the system, over Rayleigh and Ricean fading channels. The analytical model is derived for quadrature phase shift keying (QPSK modulation technique by taking into account the number of tones, signal bandwidth (BW, bit rate, and transmission power. Numerical results are presented to validate the analysis, and to justify the approximations made therein. Moreover, these results are shown to agree completely with those obtained by simulation.

  7. Interpolation-free scanning and sampling scheme for tomographic reconstructions

    International Nuclear Information System (INIS)

    Donohue, K.D.; Saniie, J.

    1987-01-01

    In this paper a sampling scheme is developed for computer tomography (CT) systems that eliminates the need for interpolation. A set of projection angles along with their corresponding sampling rates are derived from the geometry of the Cartesian grid such that no interpolation is required to calculate the final image points for the display grid. A discussion is presented on the choice of an optimal set of projection angles that will maintain a resolution comparable to a sampling scheme of regular measurement geometry, while minimizing the computational load. The interpolation-free scanning and sampling (IFSS) scheme developed here is compared to a typical sampling scheme of regular measurement geometry through a computer simulation

  8. High spectral efficiency optical CDMA system based on guard-time and optical hard-limiting (OHL)

    Energy Technology Data Exchange (ETDEWEB)

    Gagliardi, R M; Bennett, C V; Mendez, A J; Hernandez, V J; Lennon, W J

    2003-12-02

    Optical code-division multiple access (OCDMA) is an interesting subject of research because of its potential to support asynchronous, bursty communications. OCDMA has been investigated for local area networks, access networks, and, more recently, as a packet label for emerging networks. Two-dimensional (2-D) OCDMA codes are preferred in current research because of the flexibility of designing the codes and their higher cardinality and spectral efficiency (SE) compared with direct sequence codes based on on-off keying and intensity modulation/direct detection, and because they lend themselves to being implemented with devices developed for wavelength-division-multiplexed (WDM) transmission (the 2-D codes typically combine wavelength and time as the two dimensions of the codes). This paper shows rigorously that 2-D wavelength/time codes have better SE than one-dimensional (1-D) CDMA/WDM combinations (of the same cardinality). Then, the paper describes a specific set of wavelength/time (W/T) codes and their implementation. These 2-D codes are high performance because they simultaneously have high cardinality (/spl Gt/10), per-user high bandwidth (>1 Gb/s), and high SE (>0.10 b/s/Hz). The physical implementation of these W/T codes is described and their performance evaluated by system simulations and measurements on an OCDMA technology demonstrator. This research shows that OCDMA implementation complexity (e.g., incorporating double hard-limiting and interference estimation) can be avoided by using a guard time in the codes and an optical hard limiter in the receiver.

  9. Load Experiment of the vDACS Scheme in case of the 300 Clients

    Directory of Open Access Journals (Sweden)

    Kazuya Odagiri

    2017-09-01

    Full Text Available In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM. This is the scheme for managing a whole Local Area Network (LAN through communication control for every user. In this PBNM, two types of schemes exist. The first is the scheme for managing the whole LAN by locating the communication control mechanisms on the path between network servers and clients. The second is the scheme of managing the whole LAN by locating the communication control mechanisms on clients. As the second scheme, we have studied theoretically about the Destination Addressing Control System (DACS Scheme. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, as the progression phase for the last goal, we perform the load experiment of the cloud type virtual PBNM named the vDACS Scheme, which can be used by plural organizations, for applications to the small and medium size scale organization. The number of clients used in an experiment is 300.

  10. Blind Reduced-Rank MMSE Detector for DS-CDMA Systems

    Directory of Open Access Journals (Sweden)

    Xiaodong Cai

    2003-01-01

    Full Text Available We first develop a reduced-rank minimum mean squared error (MMSE detector for direct-sequence (DS code division multiple access (CDMA by forcing the linear MMSE detector to lie in a signal subspace of a reduced dimension. While a reduced-rank MMSE detector has lower complexity, it cannot outperform the full-rank MMSE detector. We then concentrate on the blind reduced-rank MMSE detector which is obtained from an estimated covariance matrix. Our analysis and simulation results show that when the desired user′s signal is in a low-dimensional subspace, there exists an optimal subspace so that the blind reduced-rank MMSE detector lying in this subspace has the best performance. By properly choosing a subsspace, we guarantee that the optimal blind reduced-rank MMSE detector is obtained. An adaptive blind reduced-rank MMSE detector, based on a subspace tracking algorithm, is developed. The adaptive blind reduced-rank MMSE detector exhibits superior steady-state performance and fast convergence speed.

  11. Modified Aggressive Packet Combining Scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2010-06-01

    In this letter, a few schemes are presented to improve the performance of aggressive packet combining scheme (APC). To combat error in computer/data communication networks, ARQ (Automatic Repeat Request) techniques are used. Several modifications to improve the performance of ARQ are suggested by recent research and are found in literature. The important modifications are majority packet combining scheme (MjPC proposed by Wicker), packet combining scheme (PC proposed by Chakraborty), modified packet combining scheme (MPC proposed by Bhunia), and packet reversed packet combining (PRPC proposed by Bhunia) scheme. These modifications are appropriate for improving throughput of conventional ARQ protocols. Leung proposed an idea of APC for error control in wireless networks with the basic objective of error control in uplink wireless data network. We suggest a few modifications of APC to improve its performance in terms of higher throughput, lower delay and higher error correction capability. (author)

  12. Approximate equiangular tight frames for compressed sensing and CDMA applications

    Science.gov (United States)

    Tsiligianni, Evaggelia; Kondi, Lisimachos P.; Katsaggelos, Aggelos K.

    2017-12-01

    Performance guarantees for recovery algorithms employed in sparse representations, and compressed sensing highlights the importance of incoherence. Optimal bounds of incoherence are attained by equiangular unit norm tight frames (ETFs). Although ETFs are important in many applications, they do not exist for all dimensions, while their construction has been proven extremely difficult. In this paper, we construct frames that are close to ETFs. According to results from frame and graph theory, the existence of an ETF depends on the existence of its signature matrix, that is, a symmetric matrix with certain structure and spectrum consisting of two distinct eigenvalues. We view the construction of a signature matrix as an inverse eigenvalue problem and propose a method that produces frames of any dimensions that are close to ETFs. Due to the achieved equiangularity property, the so obtained frames can be employed as spreading sequences in synchronous code-division multiple access (s-CDMA) systems, besides compressed sensing.

  13. The analysis of MAI in large scale MIMO-CDMA system

    Science.gov (United States)

    Berceanu, Madalina-Georgiana; Voicu, Carmen; Halunga, Simona

    2016-12-01

    Recently, technological development imposed a rapid growth in the use of data carried by cellular services, which also implies the necessity of higher data rates and lower latency. To meet the users' demands, it was brought into discussion a series of new data processing techniques. In this paper, we approached the MIMO technology that uses multiple antennas at the receiver and transmitter ends. To study the performances obtained by this technology, we proposed a MIMO-CDMA system, where image transmission has been used instead of random data transmission to take benefit of a larger range of quality indicators. In the simulations we increased the number of antennas, we observed how the performances of the system are modified and, based on that, we were able to make a comparison between a conventional MIMO and a Large Scale MIMO system, in terms of BER and MSSIM index, which is a metric that compares the quality of the image before transmission with the received one.

  14. Communication Optimizations for a Wireless Distributed Prognostic Framework

    Science.gov (United States)

    Saha, Sankalita; Saha, Bhaskar; Goebel, Kai

    2009-01-01

    Distributed architecture for prognostics is an essential step in prognostic research in order to enable feasible real-time system health management. Communication overhead is an important design problem for such systems. In this paper we focus on communication issues faced in the distributed implementation of an important class of algorithms for prognostics - particle filters. In spite of being computation and memory intensive, particle filters lend well to distributed implementation except for one significant step - resampling. We propose new resampling scheme called parameterized resampling that attempts to reduce communication between collaborating nodes in a distributed wireless sensor network. Analysis and comparison with relevant resampling schemes is also presented. A battery health management system is used as a target application. A new resampling scheme for distributed implementation of particle filters has been discussed in this paper. Analysis and comparison of this new scheme with existing resampling schemes in the context for minimizing communication overhead have also been discussed. Our proposed new resampling scheme performs significantly better compared to other schemes by attempting to reduce both the communication message length as well as number total communication messages exchanged while not compromising prediction accuracy and precision. Future work will explore the effects of the new resampling scheme in the overall computational performance of the whole system as well as full implementation of the new schemes on the Sun SPOT devices. Exploring different network architectures for efficient communication is an importance future research direction as well.

  15. Communication Schemes with Constrained Reordering of Resources

    DEFF Research Database (Denmark)

    Popovski, Petar; Utkovski, Zoran; Trillingsgaard, Kasper Fløe

    2013-01-01

    This paper introduces a communication model inspired by two practical scenarios. The first scenario is related to the concept of protocol coding, where information is encoded in the actions taken by an existing communication protocol. We investigate strategies for protocol coding via combinatorial...... reordering of the labelled user resources (packets, channels) in an existing, primary system. However, the degrees of freedom of the reordering are constrained by the operation of the primary system. The second scenario is related to communication systems with energy harvesting, where the transmitted signals...... are constrained by the energy that is available through the harvesting process. We have introduced a communication model that covers both scenarios and elicits their key feature, namely the constraints of the primary system or the harvesting process. We have shown how to compute the capacity of the channels...

  16. A Three Factor Remote User Authentication Scheme Using Collision Resist Fuzzy Extractor in Single Server Environment

    Directory of Open Access Journals (Sweden)

    Giri Debasis

    2017-01-01

    Full Text Available Due to rapid growth of online applications, it is needed to provide such a facility by which communicators can get the services by applying the applications in a secure way. As communications are done through an insecure channel like Internet, any adversary can trap and modify the communication messages. Only authentication procedure can overcome the aforementioned problem. Many researchers have proposed so many authentication schemes in this literature. But, this paper has shown that many of them are not usable in real world application scenarios because, the existing schemes cannot resist all the possible attacks. Therefore, this paper has proposed a three factor authentication scheme using hash function and fuzzy extractor. This paper has further analyzed the security of the proposed scheme using random oracle model. The analysis shows that the proposed scheme can resist all the possible attacks. Furthermore, comparison between proposed scheme and related existing schemes shows that the proposed scheme has better trade-off among storage, computational and communication costs.

  17. Performance Analysis of Spectral-Phase-Encoded Optical CDMA System Using Two-Photon-Absorption Receiver Structure for Asynchronous and Slot-Level Synchronous Transmitters

    Science.gov (United States)

    Jamshidi, Kambiz; Salehi, Jawad A.

    2007-06-01

    In this paper, we analyze the performance of a nonlinear two-photon-absorption (TPA) receiver and compare its performance with that of a single-photon-absorption (SPA) receiver in the context of spectral-phase-encoded optical code-division multiple access (CDMA) technique. The performances for the above systems are evaluated for two different transmission scenarios, namely, asynchronous and slot-level synchronous transmitters. Performance evaluation includes different sources of degradation such as multiple-access interference, noise due to optical amplification, shot noise, and thermal noise. In obtaining the performance, the mean and variance of the received signal in each of the above techniques are derived, and bit error rate is obtained using Gaussian approximation. In general, it is shown that TPA receivers are superior in performance with respect to SPA receivers when the receiver employs a much slower photodetector in comparison with the laser's transmitted pulse duration. This, indeed, is the reason behind the choice of nonlinear receivers, such as TPA, in most spectral-phase-encoded optical CDMA systems.

  18. Certificateless short sequential and broadcast multisignature schemes using elliptic curve bilinear pairings

    Directory of Open Access Journals (Sweden)

    SK Hafizul Islam

    2014-01-01

    Full Text Available Several certificateless short signature and multisignature schemes based on traditional public key infrastructure (PKI or identity-based cryptosystem (IBC have been proposed in the literature; however, no certificateless short sequential (or serial multisignature (CL-SSMS or short broadcast (or parallel multisignature (CL-SBMS schemes have been proposed. In this paper, we propose two such new CL-SSMS and CL-SBMS schemes based on elliptic curve bilinear pairing. Like any certificateless public key cryptosystem (CL-PKC, the proposed schemes are free from the public key certificate management burden and the private key escrow problem as found in PKI- and IBC-based cryptosystems, respectively. In addition, the requirements of the expected security level and the fixed length signature with constant verification time have been achieved in our schemes. The schemes are communication efficient as the length of the multisignature is equivalent to a single elliptic curve point and thus become the shortest possible multisignature scheme. The proposed schemes are then suitable for communication systems having resource constrained devices such as PDAs, mobile phones, RFID chips, and sensors where the communication bandwidth, battery life, computing power and storage space are limited.

  19. ITS Multi-path Communications Access Decision Scheme

    Directory of Open Access Journals (Sweden)

    Miroslav Svitek

    2008-02-01

    Full Text Available Intelligent Transport Systems (ITS require widely spread and guarantied quality communications services. Method of ITS decomposition to set of subsystems and quantification of communications subsystems parameters is introduced. Due to typical complexity of the IST solution and mobility as the typical system elements property idea of communications systems with multipath multivendor structures is adopted. Resolution of seamless switching within a set of available wireless access solutions is presented. CALM based system or specifically designed and configured L3/L2 switching can be relevant solution for multi-path access communication system. These systems meet requirements of the seamless secure communications functionality within even extensive cluster of moving objects. Competent decision processes based on precisely quantified system requirements and each performance indicator tolerance range must be implemented to keep service up and running with no influence of continuously changing conditions in time and served space. Method of different paths service quality evaluation and selection of the best possible active communications access path is introduced. Proposed approach is based on Kalman filtering, which separates reasonable part of noise and also allows prediction of the individual parameters near future behavior. Presented classification algorithm applied on filtered measured data combined with deterministic parameters is trained using training data, i.e. combination of parameters vectors line and relevant decisions. Quality of classification is dependent on the size and quality of the training sets. This method is studied within projects e-Ident, DOTEK and SRATVU which are elaborating results of project CAMNA.

  20. DREAM: Classification scheme for dialog acts in clinical research query mediation.

    Science.gov (United States)

    Hoxha, Julia; Chandar, Praveen; He, Zhe; Cimino, James; Hanauer, David; Weng, Chunhua

    2016-02-01

    Clinical data access involves complex but opaque communication between medical researchers and query analysts. Understanding such communication is indispensable for designing intelligent human-machine dialog systems that automate query formulation. This study investigates email communication and proposes a novel scheme for classifying dialog acts in clinical research query mediation. We analyzed 315 email messages exchanged in the communication for 20 data requests obtained from three institutions. The messages were segmented into 1333 utterance units. Through a rigorous process, we developed a classification scheme and applied it for dialog act annotation of the extracted utterances. Evaluation results with high inter-annotator agreement demonstrate the reliability of this scheme. This dataset is used to contribute preliminary understanding of dialog acts distribution and conversation flow in this dialog space. Copyright © 2015 Elsevier Inc. All rights reserved.

  1. Security enhanced multi-factor biometric authentication scheme using bio-hash function.

    Directory of Open Access Journals (Sweden)

    Younsung Choi

    Full Text Available With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.

  2. Security enhanced multi-factor biometric authentication scheme using bio-hash function.

    Science.gov (United States)

    Choi, Younsung; Lee, Youngsook; Moon, Jongho; Won, Dongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An's scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user's ID during login. Cao and Ge improved upon Younghwa An's scheme, but various security problems remained. This study demonstrates that Cao and Ge's scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge's scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost.

  3. Security enhanced multi-factor biometric authentication scheme using bio-hash function

    Science.gov (United States)

    Lee, Youngsook; Moon, Jongho

    2017-01-01

    With the rapid development of personal information and wireless communication technology, user authentication schemes have been crucial to ensure that wireless communications are secure. As such, various authentication schemes with multi-factor authentication have been proposed to improve the security of electronic communications. Multi-factor authentication involves the use of passwords, smart cards, and various biometrics to provide users with the utmost privacy and data protection. Cao and Ge analyzed various authentication schemes and found that Younghwa An’s scheme was susceptible to a replay attack where an adversary masquerades as a legal server and a user masquerading attack where user anonymity is not provided, allowing an adversary to execute a password change process by intercepting the user’s ID during login. Cao and Ge improved upon Younghwa An’s scheme, but various security problems remained. This study demonstrates that Cao and Ge’s scheme is susceptible to a biometric recognition error, slow wrong password detection, off-line password attack, user impersonation attack, ID guessing attack, a DoS attack, and that their scheme cannot provide session key agreement. Then, to address all weaknesses identified in Cao and Ge’s scheme, this study proposes a security enhanced multi-factor biometric authentication scheme and provides a security analysis and formal analysis using Burrows-Abadi-Needham logic. Finally, the efficiency analysis reveals that the proposed scheme can protect against several possible types of attacks with only a slightly high computational cost. PMID:28459867

  4. Turbulence mitigation scheme based on spatial diversity in orbital-angular-momentum multiplexed system

    Science.gov (United States)

    Zou, Li; Wang, Le; Zhao, Shengmei

    2017-10-01

    Atmospheric turbulence (AT) induced crosstalk can significantly impair the performance of free-space optical (FSO) communication link using orbital angular momentum (OAM) multiplexing. In this paper, we propose a spatial diversity (SD) turbulence mitigation scheme in an OAM-multiplexed FSO communication link. First, we present a SD mitigation model for the OAM-multiplexed FSO communication link under AT. Then we present a SD combining technique based on equal gain to enhance AT tolerance of the OAM-multiplexed FSO communication link. The numerical results show that performance of the OAM-multiplexed communication link has greatly improved by the proposed scheme. When the turbulence strength Cn2 is 5 × 10-15m - 2 / 3, the transmission distance is 1000 m and the channel signal-to-noise ratio (SNR) is 20 dB, the bit-error-rate (BER) performance of four spatial multiplexed OAM modes lm = + 1 , + 2 , + 3 , + 4 are 3 fold increase in comparison with those results without the proposed scheme. The proposed scheme is a promising direction for compensating the interference caused by AT in the OAM-multiplexed FSO communication link.

  5. CAD for CT colonography: toward a preparation-independent scheme

    International Nuclear Information System (INIS)

    Naeppi, J.

    2007-01-01

    Computer-aided detection (CAD) systems can be used to automatically detect and display the locations of polyps and masses in computed tomographic colonography (CTC) data for assisting radiologists' image interpretation. Rapid technical advancements over the last few years have established a fundamental CAD scheme for CTC that includes the steps of colon extraction, polyp detection, and false-positive (FP) reduction. Several CAD prototype systems have demonstrated clinically acceptable high polyp detection sensitivity with relatively few FP detections in cathartic CTC, and observer studies have demonstrated the potential benefit of such systems in improving the accuracy and consistency of radiologists' detection performance. Some CAD prototype systems have also demonstrated promising performance in reduced cathartic and non-cathartic CTC. Recent advancements suggest that CAD systems can soon be expected to provide a preparation-independent scheme that can yield consistently high detection sensitivity with moderately low FP rate not only with cathartic CTC protocols but over a wide range of cathartic, reduced cathartic, and non-cathartic CTC protocols. (orig.)

  6. W-CDMA Uplink Capacity and Interference Statistics of a LongGroove-Shaped Road Microcells Using A Hybrid Propagation Model

    Directory of Open Access Journals (Sweden)

    L. de Haro-Ariet

    2003-09-01

    Full Text Available The uplink capacity and the interference statistics of the sectorsof a long groove-shaped road W-CDMA microcell are studied. A model of 9microcells in a groove-shaped road is used to analyze the uplink. Ahybrid model for the propagation is used in the analysis. The capacityand the interference statistics of the cell are studied for differentsector ranges, different specific attenuation factors, differentantenna side lobe levels and different bend losses.

  7. Mobile Position Estimation using Artificial Neural Network in CDMA Cellular Systems

    Directory of Open Access Journals (Sweden)

    Omar Waleed Abdulwahhab

    2017-01-01

    Full Text Available Using the Neural network as a type of associative memory will be introduced in this paper through the problem of mobile position estimation where mobile estimate its location depending on the signal strength reach to it from several around base stations where the neural network can be implemented inside the mobile. Traditional methods of time of arrival (TOA and received signal strength (RSS are used and compared with two analytical methods, optimal positioning method and average positioning method. The data that are used for training are ideal since they can be obtained based on geometry of CDMA cell topology. The test of the two methods TOA and RSS take many cases through a nonlinear path that MS can move through that region. The results show that the neural network has good performance compared with two other analytical methods which are average positioning method and optimal positioning method.

  8. The development of a speech act coding scheme to characterize communication patterns under an off-normal situation in nuclear power plants

    International Nuclear Information System (INIS)

    Kim, Seung Hwan; Park, Jin Kyun

    2009-01-01

    Since communication is an important means to exchange information between individuals/teams or auxiliary means to share resources and information given in the team and group activity, effective communication is the prerequisite for construct powerful teamwork by a sharing mental model. Therefore, unless communication is performed efficiently, the quality of task and performance of team lower. Furthermore, since communication is highly related to situation awareness during team activities, inappropriate communication causes a lack of situation awareness and tension and stress are intensified and errors are increased. According to lesson learned from several accidents that have actually occurred in nuclear power plant (NPP), consequence of accident leads most critical results and is more dangerous than those of other industries. In order to improve operator's cope ability and operation ability through simulation training with various off-normal condition, the operation groups are trained regularly every 6 months in the training center of reference NPP. The objective of this study is to suggest modified speech act coding scheme and to elucidate the communication pattern characteristics of an operator's conversation during an abnormal situation in NPP

  9. Saturation Detection-Based Blocking Scheme for Transformer Differential Protection

    Directory of Open Access Journals (Sweden)

    Byung Eun Lee

    2014-07-01

    Full Text Available This paper describes a current differential relay for transformer protection that operates in conjunction with a core saturation detection-based blocking algorithm. The differential current for the magnetic inrush or over-excitation has a point of inflection at the start and end of each saturation period of the transformer core. At these instants, discontinuities arise in the first-difference function of the differential current. The second- and third-difference functions convert the points of inflection into pulses, the magnitudes of which are large enough to detect core saturation. The blocking signal is activated if the third-difference of the differential current is larger than the threshold and is maintained for one cycle. In addition, a method to discriminate between transformer saturation and current transformer (CT saturation is included. The performance of the proposed blocking scheme was compared with that of a conventional harmonic blocking method. The test results indicate that the proposed scheme successfully discriminates internal faults even with CT saturation from the magnetic inrush, over-excitation, and external faults with CT saturation, and can significantly reduce the operating time delay of the relay.

  10. A repeat-until-success quantum computing scheme

    Energy Technology Data Exchange (ETDEWEB)

    Beige, A [School of Physics and Astronomy, University of Leeds, Leeds LS2 9JT (United Kingdom); Lim, Y L [DSO National Laboratories, 20 Science Park Drive, Singapore 118230, Singapore (Singapore); Kwek, L C [Department of Physics, National University of Singapore, 2 Science Drive 3, Singapore 117542, Singapore (Singapore)

    2007-06-15

    Recently we proposed a hybrid architecture for quantum computing based on stationary and flying qubits: the repeat-until-success (RUS) quantum computing scheme. The scheme is largely implementation independent. Despite the incompleteness theorem for optical Bell-state measurements in any linear optics set-up, it allows for the implementation of a deterministic entangling gate between distant qubits. Here we review this distributed quantum computation scheme, which is ideally suited for integrated quantum computation and communication purposes.

  11. A repeat-until-success quantum computing scheme

    International Nuclear Information System (INIS)

    Beige, A; Lim, Y L; Kwek, L C

    2007-01-01

    Recently we proposed a hybrid architecture for quantum computing based on stationary and flying qubits: the repeat-until-success (RUS) quantum computing scheme. The scheme is largely implementation independent. Despite the incompleteness theorem for optical Bell-state measurements in any linear optics set-up, it allows for the implementation of a deterministic entangling gate between distant qubits. Here we review this distributed quantum computation scheme, which is ideally suited for integrated quantum computation and communication purposes

  12. Development and feasibility testing of the Pediatric Emergency Discharge Interaction Coding Scheme.

    Science.gov (United States)

    Curran, Janet A; Taylor, Alexandra; Chorney, Jill; Porter, Stephen; Murphy, Andrea; MacPhee, Shannon; Bishop, Andrea; Haworth, Rebecca

    2017-08-01

    Discharge communication is an important aspect of high-quality emergency care. This study addresses the gap in knowledge on how to describe discharge communication in a paediatric emergency department (ED). The objective of this feasibility study was to develop and test a coding scheme to characterize discharge communication between health-care providers (HCPs) and caregivers who visit the ED with their children. The Pediatric Emergency Discharge Interaction Coding Scheme (PEDICS) and coding manual were developed following a review of the literature and an iterative refinement process involving HCP observations, inter-rater assessments and team consensus. The coding scheme was pilot-tested through observations of HCPs across a range of shifts in one urban paediatric ED. Overall, 329 patient observations were carried out across 50 observational shifts. Inter-rater reliability was evaluated in 16% of the observations. The final version of the PEDICS contained 41 communication elements. Kappa scores were greater than .60 for the majority of communication elements. The most frequently observed communication elements were under the Introduction node and the least frequently observed were under the Social Concerns node. HCPs initiated the majority of the communication. Pediatric Emergency Discharge Interaction Coding Scheme addresses an important gap in the discharge communication literature. The tool is useful for mapping patterns of discharge communication between HCPs and caregivers. Results from our pilot test identified deficits in specific areas of discharge communication that could impact adherence to discharge instructions. The PEDICS would benefit from further testing with a different sample of HCPs. © 2017 The Authors. Health Expectations Published by John Wiley & Sons Ltd.

  13. Error forecasting schemes of error correction at receiver

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2007-08-01

    To combat error in computer communication networks, ARQ (Automatic Repeat Request) techniques are used. Recently Chakraborty has proposed a simple technique called the packet combining scheme in which error is corrected at the receiver from the erroneous copies. Packet Combining (PC) scheme fails: (i) when bit error locations in erroneous copies are the same and (ii) when multiple bit errors occur. Both these have been addressed recently by two schemes known as Packet Reversed Packet Combining (PRPC) Scheme, and Modified Packet Combining (MPC) Scheme respectively. In the letter, two error forecasting correction schemes are reported, which in combination with PRPC offer higher throughput. (author)

  14. CP decomposition approach to blind separation for DS-CDMA system using a new performance index

    Science.gov (United States)

    Rouijel, Awatif; Minaoui, Khalid; Comon, Pierre; Aboutajdine, Driss

    2014-12-01

    In this paper, we present a canonical polyadic (CP) tensor decomposition isolating the scaling matrix. This has two major implications: (i) the problem conditioning shows up explicitly and could be controlled through a constraint on the so-called coherences and (ii) a performance criterion concerning the factor matrices can be exactly calculated and is more realistic than performance metrics used in the literature. Two new algorithms optimizing the CP decomposition based on gradient descent are proposed. This decomposition is illustrated by an application to direct-sequence code division multiplexing access (DS-CDMA) systems; computer simulations are provided and demonstrate the good behavior of these algorithms, compared to others in the literature.

  15. Enhanced ID-Based Authentication Scheme Using OTP in Smart Grid AMI Environment

    Directory of Open Access Journals (Sweden)

    Sang-Soo Yeo

    2014-01-01

    Full Text Available This paper presents the vulnerabilities analyses of KL scheme which is an ID-based authentication scheme for AMI network attached SCADA in smart grid and proposes a security-enhanced authentication scheme which satisfies forward secrecy as well as security requirements introduced in KL scheme and also other existing schemes. The proposed scheme uses MDMS which is the supervising system located in an electrical company as a time-synchronizing server in order to synchronize smart devices at home and conducts authentication between smart meter and smart devices using a new secret value generated by an OTP generator every session. The proposed scheme has forward secrecy, so it increases overall security, but its communication and computation overhead reduce its performance slightly, comparing the existing schemes. Nonetheless, hardware specification and communication bandwidth of smart devices will have better conditions continuously, so the proposed scheme would be a good choice for secure AMI environment.

  16. Spreading Sequence Design for Multiple Cell Synchronous DS-CDMA Systems under Total Weighted Squared Correlation Criterion

    Directory of Open Access Journals (Sweden)

    Cotae Paul

    2004-01-01

    Full Text Available An algorithm for designing spreading sequences for an overloaded multicellular synchronous DS-CDMA system on uplink is introduced. The criterion used to measure the optimality of the design is the total weighted square correlation (TWSC assuming the channel state information known perfectly at both transmitter and receiver. By using this algorithm it is possible to obtain orthogonal generalized WBE sequences sets for any processing gain. The bandwidth of initial generalized WBE signals of each cell is preserved in the extended signal space associated to multicellular system. Mathematical formalism is illustrated by selected numerical examples.

  17. Communication-based fault handling scheme for ungrounded distribution systems

    International Nuclear Information System (INIS)

    Yang, X.; Lim, S.I.; Lee, S.J.; Choi, M.S.

    2006-01-01

    The requirement for high quality and highly reliable power supplies has been increasing as a result of increasing demand for power. At the time of a fault occurrence in a distribution system, some protection method would be dedicated to fault section isolation and service restoration. However, if there are many outage areas when the protection method is performed, it is an inconvenience to the customer. A conventional method to determine a fault section in ungrounded systems requires many successive outage invocations. This paper proposed an efficient fault section isolation method and service restoration method for single line-to-ground fault in an ungrounded distribution system that was faster than the conventional one using the information exchange between connected feeders. The proposed algorithm could be performed without any power supply interruption and could decrease the number of switching operations, so that customers would not experience outages very frequently. The method involved the use of an intelligent communication method and a sequential switching control scheme. The proposed algorithm was also applied in both a single-tie and multi-tie distribution system. This proposed algorithm has been verified through fault simulations in a simple model of ungrounded multi-tie distribution system. The method proposed in this paper was proven to offer more efficient fault identification and much less outage time than the conventional method. The proposed method could contribute to a system design since it is valid in multi-tie systems. 5 refs., 2 tabs., 8 figs

  18. The Time Division Multi-Channel Communication Model and the Correlative Protocol Based on Quantum Time Division Multi-Channel Communication

    International Nuclear Information System (INIS)

    Liu Xiao-Hui; Pei Chang-Xing; Nie Min

    2010-01-01

    Based on the classical time division multi-channel communication theory, we present a scheme of quantum time-division multi-channel communication (QTDMC). Moreover, the model of quantum time division switch (QTDS) and correlative protocol of QTDMC are proposed. The quantum bit error rate (QBER) is analyzed and the QBER simulation test is performed. The scheme shows that the QTDS can carry out multi-user communication through quantum channel, the QBER can also reach the reliability requirement of communication, and the protocol of QTDMC has high practicability and transplantable. The scheme of QTDS may play an important role in the establishment of quantum communication in a large scale in the future. (general)

  19. A Scheme for Verification on Data Integrity in Mobile Multicloud Computing Environment

    Directory of Open Access Journals (Sweden)

    Laicheng Cao

    2016-01-01

    Full Text Available In order to verify the data integrity in mobile multicloud computing environment, a MMCDIV (mobile multicloud data integrity verification scheme is proposed. First, the computability and nondegeneracy of verification can be obtained by adopting BLS (Boneh-Lynn-Shacham short signature scheme. Second, communication overhead is reduced based on HVR (Homomorphic Verifiable Response with random masking and sMHT (sequence-enforced Merkle hash tree construction. Finally, considering the resource constraints of mobile devices, data integrity is verified by lightweight computing and low data transmission. The scheme improves shortage that mobile device communication and computing power are limited, it supports dynamic data operation in mobile multicloud environment, and data integrity can be verified without using direct source file block. Experimental results also demonstrate that this scheme can achieve a lower cost of computing and communications.

  20. Verhulst populational model applied to distributed power control in DS/CDMA

    Directory of Open Access Journals (Sweden)

    Paul Jean Etienne Jeszensky

    2005-02-01

    Full Text Available In this paper the continuous dynamic model of Verhulst is used. It had been initially elaborated to describe the population growth of biological species with food restriction and physical space, in order to synthesize a new distributed power control algorithm (DPCA, applicable in direct sequence code division multiple access (DS-CDMA systems. The discretization of the corresponding differential equation is accomplished via numeric integration Euler method (NIE. The properties of the proposed recursive algorithm, as Euclidian distance from optimum vector after convergence, convergence speed, normalized mean squared error (NSE, average power consumption per user and implementation complexity, are investigated through simulations. The simulation results are confronted with the other DPCAs: the classic algorithm derived by Foschini and Miljanic and the sigmoidal by Uykan and Koivo. With estimate errors, the proposed DPCA showed smaller discrepancy from the optimum power vector allocation after convergence and better convergence. Additionally, the Gerchgorin Circles theory (GC is applied for the feasibility of the power allocation problem.

  1. PET/CT (and CT) instrumentation, image reconstruction and data transfer for radiotherapy planning

    International Nuclear Information System (INIS)

    Sattler, Bernhard; Lee, John A.; Lonsdale, Markus; Coche, Emmanuel

    2010-01-01

    The positron emission tomography in combination with CT in hybrid, cross-modality imaging systems (PET/CT) gains more and more importance as a part of the treatment-planning procedure in radiotherapy. Positron emission tomography (PET), as a integral part of nuclear medicine imaging and non-invasive imaging technique, offers the visualization and quantification of pre-selected tracer metabolism. In combination with the structural information from CT, this molecular imaging technique has great potential to support and improve the outcome of the treatment-planning procedure prior to radiotherapy. By the choice of the PET-Tracer, a variety of different metabolic processes can be visualized. First and foremost, this is the glucose metabolism of a tissue as well as for instance hypoxia or cell proliferation. This paper comprises the system characteristics of hybrid PET/CT systems. Acquisition and processing protocols are described in general and modifications to cope with the special needs in radiooncology. This starts with the different position of the patient on a special table top, continues with the use of the same fixation material as used for positioning of the patient in radiooncology while simulation and irradiation and leads to special processing protocols that include the delineation of the volumes that are subject to treatment planning and irradiation (PTV, GTV, CTV, etc.). General CT acquisition and processing parameters as well as the use of contrast enhancement of the CT are described. The possible risks and pitfalls the investigator could face during the hybrid-imaging procedure are explained and listed. The interdisciplinary use of different imaging modalities implies a increase of the volume of data created. These data need to be stored and communicated fast, safe and correct. Therefore, the DICOM-Standard provides objects and classes for this purpose (DICOM RT). Furthermore, the standard DICOM objects and classes for nuclear medicine (NM, PT) and

  2. The development of a speech act coding scheme to characterize communication patterns under an off-normal situation in nuclear power plants

    Energy Technology Data Exchange (ETDEWEB)

    Kim, Seung Hwan; Park, Jin Kyun [Korea Atomic Energy Research Institute, Daejeon (Korea, Republic of)

    2009-05-15

    Since communication is an important means to exchange information between individuals/teams or auxiliary means to share resources and information given in the team and group activity, effective communication is the prerequisite for construct powerful teamwork by a sharing mental model. Therefore, unless communication is performed efficiently, the quality of task and performance of team lower. Furthermore, since communication is highly related to situation awareness during team activities, inappropriate communication causes a lack of situation awareness and tension and stress are intensified and errors are increased. According to lesson learned from several accidents that have actually occurred in nuclear power plant (NPP), consequence of accident leads most critical results and is more dangerous than those of other industries. In order to improve operator's cope ability and operation ability through simulation training with various off-normal condition, the operation groups are trained regularly every 6 months in the training center of reference NPP. The objective of this study is to suggest modified speech act coding scheme and to elucidate the communication pattern characteristics of an operator's conversation during an abnormal situation in NPP.

  3. Reduction of ring artefacts in high resolution micro-CT reconstructions

    International Nuclear Information System (INIS)

    Sijbers, Jan; Postnov, Andrei

    2004-01-01

    High resolution micro-CT images are often corrupted by ring artefacts, prohibiting quantitative analysis and hampering post processing. Removing or at least significantly reducing such artefacts is indispensable. However, since micro-CT systems are pushed to the extremes in the quest for the ultimate spatial resolution, ring artefacts can hardly be avoided. Moreover, as opposed to clinical CT systems, conventional correction schemes such as flat-field correction do not lead to satisfactory results. Therefore, in this note a simple but efficient and fast post processing method is proposed that effectively reduces ring artefacts in reconstructed μ-CT images. (note)

  4. In-Band α-Duplex Scheme for Cellular Networks: A Stochastic Geometry Approach

    KAUST Repository

    Alammouri, Ahmad

    2016-07-13

    In-band full-duplex (FD) communications have been optimistically promoted to improve the spectrum utilization and efficiency. However, the penetration of FD communications to the cellular networks domain is challenging due to the imposed uplink/downlink interference. This paper presents a tractable framework, based on stochastic geometry, to study FD communications in cellular networks. Particularly, we assess the FD communications effect on the network performance and quantify the associated gains. The study proves the vulnerability of the uplink to the downlink interference and shows that FD rate gains harvested in the downlink (up to 97%) come at the expense of a significant degradation in the uplink rate (up to 94%). Therefore, we propose a novel fine-grained duplexing scheme, denoted as -duplex scheme, which allows a partial overlap between the uplink and the downlink frequency bands. We derive the required conditions to harvest rate gains from the -duplex scheme and show its superiority to both the FD and half-duplex (HD) schemes. In particular, we show that the -duplex scheme provides a simultaneous improvement of 28% for the downlink rate and 56% for the uplink rate. Finally, we show that the amount of the overlap can be optimized based on the network design objective.

  5. Cost-based droop scheme for DC microgrid

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Wang, Peng; Loh, Poh Chiang

    2014-01-01

    voltage level, less on optimized operation and control of generation sources. The latter theme is perused in this paper, where cost-based droop scheme is proposed for distributed generators (DGs) in DC microgrids. Unlike traditional proportional power sharing based droop scheme, the proposed scheme......-connected operation. Most importantly, the proposed scheme can reduce overall total generation cost in DC microgrids without centralized controller and communication links. The performance of the proposed scheme has been verified under different load conditions.......DC microgrids are gaining interest due to higher efficiencies of DC distribution compared with AC. The benefits of DC systems have been widely researched for data centers, IT facilities and residential applications. The research focus, however, has been more on system architecture and optimal...

  6. A New Privacy-Preserving Handover Authentication Scheme for Wireless Networks.

    Science.gov (United States)

    Wang, Changji; Yuan, Yuan; Wu, Jiayuan

    2017-06-20

    Handover authentication is a critical issue in wireless networks, which is being used to ensure mobile nodes wander over multiple access points securely and seamlessly. A variety of handover authentication schemes for wireless networks have been proposed in the literature. Unfortunately, existing handover authentication schemes are vulnerable to a few security attacks, or incur high communication and computation costs. Recently, He et al. proposed a handover authentication scheme PairHand and claimed it can resist various attacks without rigorous security proofs. In this paper, we show that PairHand does not meet forward secrecy and strong anonymity. More seriously, it is vulnerable to key compromise attack, where an adversary can recover the private key of any mobile node. Then, we propose a new efficient and provably secure handover authentication scheme for wireless networks based on elliptic curve cryptography. Compared with existing schemes, our proposed scheme can resist key compromise attack, and achieves forward secrecy and strong anonymity. Moreover, it is more efficient in terms of computation and communication.

  7. Doppler Shift Compensation Schemes in VANETs

    Directory of Open Access Journals (Sweden)

    F. Nyongesa

    2015-01-01

    Full Text Available Over the last decade vehicle-to-vehicle (V2V communication has received a lot of attention as it is a crucial issue in intravehicle communication as well as in Intelligent Transportation System (ITS. In ITS the focus is placed on integration of communication between mobile and fixed infrastructure to execute road safety as well as nonsafety information dissemination. The safety application such as emergence alerts lays emphasis on low-latency packet delivery rate (PDR, whereas multimedia and infotainment call for high data rates at low bit error rate (BER. The nonsafety information includes multimedia streaming for traffic information and infotainment applications such as playing audio content, utilizing navigation for driving, and accessing Internet. A lot of vehicular ad hoc network (VANET research has focused on specific areas including channel multiplexing, antenna diversity, and Doppler shift compensation schemes in an attempt to optimize BER performance. Despite this effort few surveys have been conducted to highlight the state-of-the-art collection on Doppler shift compensation schemes. Driven by this cause we survey some of the recent research activities in Doppler shift compensation schemes and highlight challenges and solutions as a stock-taking exercise. Moreover, we present open issues to be further investigated in order to address the challenges of Doppler shift in VANETs.

  8. Numerical Simulations of Reacting Flows Using Asynchrony-Tolerant Schemes for Exascale Computing

    Science.gov (United States)

    Cleary, Emmet; Konduri, Aditya; Chen, Jacqueline

    2017-11-01

    Communication and data synchronization between processing elements (PEs) are likely to pose a major challenge in scalability of solvers at the exascale. Recently developed asynchrony-tolerant (AT) finite difference schemes address this issue by relaxing communication and synchronization between PEs at a mathematical level while preserving accuracy, resulting in improved scalability. The performance of these schemes has been validated for simple linear and nonlinear homogeneous PDEs. However, many problems of practical interest are governed by highly nonlinear PDEs with source terms, whose solution may be sensitive to perturbations caused by communication asynchrony. The current work applies the AT schemes to combustion problems with chemical source terms, yielding a stiff system of PDEs with nonlinear source terms highly sensitive to temperature. Examples shown will use single-step and multi-step CH4 mechanisms for 1D premixed and nonpremixed flames. Error analysis will be discussed both in physical and spectral space. Results show that additional errors introduced by the AT schemes are negligible and the schemes preserve their accuracy. We acknowledge funding from the DOE Computational Science Graduate Fellowship administered by the Krell Institute.

  9. Implementation of Multiple Access Techniques Applicable for Maritime Satellite Communications

    Directory of Open Access Journals (Sweden)

    Stojce Dimov Ilcev

    2013-12-01

    Full Text Available In this paper are introduced fundamentals, characteristics, advantages and disadvantages of Multiple Access (MA employed as transmission techniques in the Maritime Mobile Satellite Communications (MMSC between ships and Coast Earth Station (CES via Geostationary Earth Orbit (GEO or Not-GEO satellite constellations. In fixed satellite communication, as a rule, especially in MMSC many users are active at the same time. The problem of simultaneous communications between many single or multipoint mobile satellite users can be solved by using MA technique, such as Frequency Division Multiple Access (FDMA, Time Division Multiple Access (TDMA, Code Division Multiple Access (CDMA, Space Division Multiple Access (SDMA and Random (Packet Division Multiple Access (RDMA. Since the resources of the systems such as the transmitting power and the bandwidth are limited, it is advisable to use the channels with complete charge and to create a different MA to the channel. This generates a problem of summation and separation of signals in the transmission and reception parts, respectively. Deciding this problem consists in the development of orthogonal channels of transmission in order to divide signals from various users unambiguously on the reception part.

  10. Minimum BER Receiver Filters with Block Memory for Uplink DS-CDMA Systems

    Directory of Open Access Journals (Sweden)

    Debbah Mérouane

    2008-01-01

    Full Text Available Abstract The problem of synchronous multiuser receiver design in the case of direct-sequence single-antenna code division multiple access (DS-CDMA uplink networks is studied over frequency selective fading channels. An exact expression for the bit error rate (BER is derived in the case of BPSK signaling. Moreover, an algorithm is proposed for finding the finite impulse response (FIR receiver filters with block memory such that the exact BER of the active users is minimized. Several properties of the minimum BER FIR filters with block memory are identified. The algorithm performance is found for scenarios with different channel qualities, spreading code lengths, receiver block memory size, near-far effects, and channel mismatch. For the BPSK constellation, the proposed FIR receiver structure with block memory has significant better BER with respect to and near-far resistance than the corresponding minimum mean square error (MMSE filters with block memory.

  11. Autonomous Droop Scheme With Reduced Generation Cost

    DEFF Research Database (Denmark)

    Nutkani, Inam Ullah; Loh, Poh Chiang; Wang, Peng

    2014-01-01

    ) of the microgrid. To reduce this TGC without relying on fast communication links, an autonomous droop scheme is proposed here, whose resulting power sharing is decided by the individual DG generation costs. Comparing it with the traditional scheme, the proposed scheme retains its simplicity and it is hence more....... This objective might, however, not suit microgrids well since DGs are usually of different types, unlike synchronous generators. Other factors like cost, efficiency, and emission penalty of each DG at different loading must be considered since they contribute directly to the total generation cost (TGC...

  12. Multiatlas whole heart segmentation of CT data using conditional entropy for atlas ranking and selection.

    Science.gov (United States)

    Zhuang, Xiahai; Bai, Wenjia; Song, Jingjing; Zhan, Songhua; Qian, Xiaohua; Shi, Wenzhe; Lian, Yanyun; Rueckert, Daniel

    2015-07-01

    Cardiac computed tomography (CT) is widely used in clinical diagnosis of cardiovascular diseases. Whole heart segmentation (WHS) plays a vital role in developing new clinical applications of cardiac CT. However, the shape and appearance of the heart can vary greatly across different scans, making the automatic segmentation particularly challenging. The objective of this work is to develop and evaluate a multiatlas segmentation (MAS) scheme using a new atlas ranking and selection algorithm for automatic WHS of CT data. Research on different MAS strategies and their influence on WHS performance are limited. This work provides a detailed comparison study evaluating the impacts of label fusion, atlas ranking, and sizes of the atlas database on the segmentation performance. Atlases in a database were registered to the target image using a hierarchical registration scheme specifically designed for cardiac images. A subset of the atlases were selected for label fusion, according to the authors' proposed atlas ranking criterion which evaluated the performance of each atlas by computing the conditional entropy of the target image given the propagated atlas labeling. Joint label fusion was used to combine multiple label estimates to obtain the final segmentation. The authors used 30 clinical cardiac CT angiography (CTA) images to evaluate the proposed MAS scheme and to investigate different segmentation strategies. The mean WHS Dice score of the proposed MAS method was 0.918 ± 0.021, and the mean runtime for one case was 13.2 min on a workstation. This MAS scheme using joint label fusion generated significantly better Dice scores than the other label fusion strategies, including majority voting (0.901 ± 0.276, p ranking study, the proposed criterion based on conditional entropy yielded a performance curve with higher WHS Dice scores compared to the conventional schemes (p ranking algorithm and joint label fusion, the MAS scheme is able to generate accurate segmentation

  13. A secure smart-card based authentication and key agreement scheme for telecare medicine information systems.

    Science.gov (United States)

    Lee, Tian-Fu; Liu, Chuan-Ming

    2013-06-01

    A smart-card based authentication scheme for telecare medicine information systems enables patients, doctors, nurses, health visitors and the medicine information systems to establish a secure communication platform through public networks. Zhu recently presented an improved authentication scheme in order to solve the weakness of the authentication scheme of Wei et al., where the off-line password guessing attacks cannot be resisted. This investigation indicates that the improved scheme of Zhu has some faults such that the authentication scheme cannot execute correctly and is vulnerable to the attack of parallel sessions. Additionally, an enhanced authentication scheme based on the scheme of Zhu is proposed. The enhanced scheme not only avoids the weakness in the original scheme, but also provides users' anonymity and authenticated key agreements for secure data communications.

  14. Redundancy scheme for multi-layered accelerator control system

    International Nuclear Information System (INIS)

    Chauhan, Amit; Fatnani, Pravin

    2009-01-01

    The control system for SRS Indus-2 has three-layered architecture. There are VMEbus based stations at the lower two layers that are controlled by their respective CPU board. The 'Profibus' fieldbus standard is used for communication between these VME stations distributed in the field. There is a Profibus controller board at each station to implement the communication protocol. The mode of communication is master-slave (command-response) type. This paper proposes a scheme to implement redundancy at the lower two layers namely Layer-2 (Supervisory Layer / Profibus-master) and Layer-3 (Equipment Unit Interface Layer / Profibus-slave). The redundancy is for both the CPU and the communication board. The scheme uses two CPU boards and two Profi controller boards at each L-3 station. This helps in decreasing any downtime resulting either from CPU faults or communication board faults that are placed in the field area. Redundancy of Profi boards provides two active communication channels between the stations that can be used in different ways thereby increasing the availability on a communication link. Redundancy of CPU boards provides certain level of auto fault-recovery as one CPU remains active and the other CPU remains in standby mode, which takes over the control of VMEbus in case of any fault in the main CPU. (author)

  15. An Energy Efficient Cooperative Hierarchical MIMO Clustering Scheme for Wireless Sensor Networks

    Directory of Open Access Journals (Sweden)

    Sungyoung Lee

    2011-12-01

    Full Text Available In this work, we present an energy efficient hierarchical cooperative clustering scheme for wireless sensor networks. Communication cost is a crucial factor in depleting the energy of sensor nodes. In the proposed scheme, nodes cooperate to form clusters at each level of network hierarchy ensuring maximal coverage and minimal energy expenditure with relatively uniform distribution of load within the network. Performance is enhanced by cooperative multiple-input multiple-output (MIMO communication ensuring energy efficiency for WSN deployments over large geographical areas. We test our scheme using TOSSIM and compare the proposed scheme with cooperative multiple-input multiple-output (CMIMO clustering scheme and traditional multihop Single-Input-Single-Output (SISO routing approach. Performance is evaluated on the basis of number of clusters, number of hops, energy consumption and network lifetime. Experimental results show significant energy conservation and increase in network lifetime as compared to existing schemes.

  16. Computer-aided detection of early interstitial lung diseases using low-dose CT images

    Energy Technology Data Exchange (ETDEWEB)

    Park, Sang Cheol; Kim, Soo Hyung [School of Electronics and Computer Engineering, Chonnam National University, Gwangju 500-757 (Korea, Republic of); Tan, Jun; Wang Xingwei; Lederman, Dror; Leader, Joseph K; Zheng Bin, E-mail: zhengb@upmc.edu [Department of Radiology, University of Pittsburgh, Pittsburgh, PA 15213 (United States)

    2011-02-21

    This study aims to develop a new computer-aided detection (CAD) scheme to detect early interstitial lung disease (ILD) using low-dose computed tomography (CT) examinations. The CAD scheme classifies each pixel depicted on the segmented lung areas into positive or negative groups for ILD using a mesh-grid-based region growth method and a multi-feature-based artificial neural network (ANN). A genetic algorithm was applied to select optimal image features and the ANN structure. In testing each CT examination, only pixels selected by the mesh-grid region growth method were analyzed and classified by the ANN to improve computational efficiency. All unselected pixels were classified as negative for ILD. After classifying all pixels into the positive and negative groups, CAD computed a detection score based on the ratio of the number of positive pixels to all pixels in the segmented lung areas, which indicates the likelihood of the test case being positive for ILD. When applying to an independent testing dataset of 15 positive and 15 negative cases, the CAD scheme yielded the area under receiver operating characteristic curve (AUC = 0.884 {+-} 0.064) and 80.0% sensitivity at 85.7% specificity. The results demonstrated the feasibility of applying the CAD scheme to automatically detect early ILD using low-dose CT examinations.

  17. 76 FR 18415 - Television Broadcasting Services; New Haven, CT

    Science.gov (United States)

    2011-04-04

    ... FEDERAL COMMUNICATIONS COMMISSION 47 CFR Part 73 [MB Docket No. 09-123; RM-11546, DA 11-501] Television Broadcasting Services; New Haven, CT AGENCY: Federal Communications Commission. ACTION: Final rule... CFR Part 73 Television. Federal Communications Commission. Barbara A. Kreisman, Chief, Video Division...

  18. New CT-aided stereotactic neurosurgery technique

    International Nuclear Information System (INIS)

    Shao, H.M.; Truong, T.K.; Reed, I.S.; Slater, R.A.

    1985-01-01

    In this communication, a new technique for CT-aided stereotactic neurosurgery is presented. The combination of specially designed hardware and software provides a fast, simple, and versatile tool for the accurate insertion of a probe into the human brain. This system is portable and can be implemented on any CT computer system. The complete procedure to perform the CT-aided stereotactic neurosurgery technique is presented. Experimental results are given which demonstrate the power of the method. Finally, the key algorithms for realizing this technique are described in the Appendix

  19. Proposal of Wireless Traffic Control Schemes for Wireless LANs

    Science.gov (United States)

    Hiraguri, Takefumi; Ichikawa, Takeo; Iizuka, Masataka; Kubota, Shuji

    This paper proposes two traffic control schemes to support the communication quality of multimedia streaming services such as VoIP and audio/video over IEEE 802.11 wireless LAN systems. The main features of the proposed scheme are bandwidth control for each flow of the multimedia streaming service and load balancing between access points (APs) of the wireless LAN by using information of data link, network and transport layers. The proposed schemes are implemented on a Linux machine which is called the wireless traffic controller (WTC). The WTC connects a high capacity backbone network and an access network to which the APs are attached. We evaluated the performance of the proposed WTC and confirmed that the communication quality of the multimedia streaming would be greatly improved by using this technique.

  20. Minimum BER Receiver Filters with Block Memory for Uplink DS-CDMA Systems

    Directory of Open Access Journals (Sweden)

    Mérouane Debbah

    2008-05-01

    Full Text Available The problem of synchronous multiuser receiver design in the case of direct-sequence single-antenna code division multiple access (DS-CDMA uplink networks is studied over frequency selective fading channels. An exact expression for the bit error rate (BER is derived in the case of BPSK signaling. Moreover, an algorithm is proposed for finding the finite impulse response (FIR receiver filters with block memory such that the exact BER of the active users is minimized. Several properties of the minimum BER FIR filters with block memory are identified. The algorithm performance is found for scenarios with different channel qualities, spreading code lengths, receiver block memory size, near-far effects, and channel mismatch. For the BPSK constellation, the proposed FIR receiver structure with block memory has significant better BER with respect to Eb/N0 and near-far resistance than the corresponding minimum mean square error (MMSE filters with block memory.

  1. Principles of mobile computing and communications

    CERN Document Server

    Othman, Mazliza

    2007-01-01

    Introduction Mobile Computing Applications Evolution of Wireless Networks and Services Summary Cellular Network Architecture UMTS Architecture Public Land Mobile Network Interfaces User Authentication Frequency Reuse Channel Assignment Location Registration and Update Handover Procedures CDMA The Move toward 3G Networks Wireless Local Area Networks IEEE 802.11 Standard IEEE 802.11b Standard (Wi-Fi) IEEE 802.11a Standard IEEE 802.11g Standard HIPERLAN/2 IEEE 802.1x Standard IEEE 802.11i Standard IEEE 802.11e Standard Security Issues IP over 802.11 WLAN Integrating 802.11 WLAN and UMTS Summary Wireless Personal Area Networks HomeRF Bluetooth Technology IEEE 802.15.3 Standard Home Area Networks Summary Wireless Sensor Networks Applications of WSNs Requirements for WSNs WSN Architecture The 802.15.4 Standard The ZigBee Protocol Power Conservation Techniques Network and Communications Configuration of Sensor Networks WSN and Emergency Response Applications Summary Mobile Ad Hoc Networks AODV DSR OLSR TBRPF Summary...

  2. Advanced Data Communications for Downhole Data Logging and Control Applications in the Oil Industry

    International Nuclear Information System (INIS)

    Spracklen, C T; Aslam, Tariq

    2013-01-01

    We present details of 'Mercury', a high-speed downhole communications system that utilizes the (metallic) wall of a gas or oil pipeline or a drill 'string' as the communications 'channel' to control or monitor equipment or sensors used in the oil industry. Conventional downhole communication systems typically use 'mud pulse' telemetry for 'Measurement While Drilling' (MWD) operations. Current mud pulse telemetry technology offers bandwidths of up to 40 bit/s. However the data rate drops with increasing length of the wellbore and is typically as low as 1.5 bit/s – 3.0 bit/s at a depth of 35,000 ft. – 40,000 ft. The system described, by contrast, offers data rates of several megabits per second over distances of many kilometres and uses Orthogonal Frequency Division Multiplexing (OFDM) coupled with Wideband Frequency Division Multiple Access (W-CDMA). This paper presents details of our system; results of several trials undertaken on actual gas pipelines in the UK will be presented at the Conference

  3. MULTIMEDIA DATA TRANSMISSION THROUGH TCP/IP USING HASH BASED FEC WITH AUTO-XOR SCHEME

    Directory of Open Access Journals (Sweden)

    R. Shalin

    2012-09-01

    Full Text Available The most preferred mode for communication of multimedia data is through the TCP/IP protocol. But on the other hand the TCP/IP protocol produces huge packet loss unavoidable due to network traffic and congestion. In order to provide a efficient communication it is necessary to recover the loss of packets. The proposed scheme implements Hash based FEC with auto XOR scheme for this purpose. The scheme is implemented through Forward error correction, MD5 and XOR for providing efficient transmission of multimedia data. The proposed scheme provides transmission high accuracy, throughput and low latency and loss.

  4. Turbulence mitigation scheme based on multiple-user detection in an orbital-angular-momentum multiplexed system

    Science.gov (United States)

    Zou, Li; Wang, Le; Zhao, Sheng-Mei; Chen, Han-Wu

    2016-11-01

    Atmospheric turbulence (AT) induced crosstalk can significantly impair the performance of a free-space optical (FSO) communication link using orbital angular momentum (OAM) multiplexing. In this paper, we propose a multiple-user detection (MUD) turbulence mitigation scheme in an OAM-multiplexed FSO communication link. First, we present a MUD equivalent communication model for an OAM-multiplexed FSO communication link under AT. In the equivalent model, each input bit stream represents one user’s information. The deformed OAM spatial modes caused by AT, instead of the pure OAM spatial modes, are used as information carriers, and the overlapping between the deformed OAM spatial modes are computed as the correlation coefficients between the users. Then, we present a turbulence mitigation scheme based on MUD idea to enhance AT tolerance of the OAM-multiplexed FSO communication link. In the proposed scheme, the crosstalk caused by AT is used as a useful component to deduce users’ information. The numerical results show that the performance of the OAM-multiplexed communication link has greatly improved by the proposed scheme. When the turbulence strength is 1 × 10-15 m-2/3, the transmission distance is 1000 m and the channel signal-to-noise ratio (SNR) is 26 dB, the bit-error-rate (BER) performance of four spatial multiplexed OAM modes lm = +1,+2,+3,+4 are all close to 10-5, and there is a 2-3 fold increase in the BER performance in comparison with those results without the proposed scheme. In addition, the proposed scheme is more effective for an OAM-multiplexed FSO communication link with a larger OAM mode topological charge interval. The proposed scheme is a promising direction for compensating the interference caused by AT in the OAM-multiplexed FSO communication link. Project supported by the National Natural Science Foundation of China (Grant Nos. 61271238 and 61475075), the Open Research Fund of Key Lab of Broadband Wireless Communication and Sensor Network

  5. NFC Secure Payment and Verification Scheme with CS E-Ticket

    Directory of Open Access Journals (Sweden)

    Kai Fan

    2017-01-01

    Full Text Available As one of the most important techniques in IoT, NFC (Near Field Communication is more interesting than ever. NFC is a short-range, high-frequency communication technology well suited for electronic tickets, micropayment, and access control function, which is widely used in the financial industry, traffic transport, road ban control, and other fields. However, NFC is becoming increasingly popular in the relevant field, but its secure problems, such as man-in-the-middle-attack and brute force attack, have hindered its further development. To address the security problems and specific application scenarios, we propose a NFC mobile electronic ticket secure payment and verification scheme in the paper. The proposed scheme uses a CS E-Ticket and offline session key generation and distribution technology to prevent major attacks and increase the security of NFC. As a result, the proposed scheme can not only be a good alternative to mobile e-ticket system but also be used in many NFC fields. Furthermore, compared with other existing schemes, the proposed scheme provides a higher security.

  6. A Sensitive ANN Based Differential Relay for Transformer Protection with Security against CT Saturation and Tap Changer Operation

    OpenAIRE

    KHORASHADI-ZADEH, Hassan; LI, Zuyi

    2014-01-01

    This paper presents an artificial neural network (ANN) based scheme for fault identification in power transformer protection. The proposed scheme is featured by the application of ANN to identifying system patterns, the unique choice of harmonics of positive sequence differential currents as ANN inputs, the effective handling of current transformer (CT) saturation with an ANN based approach, and the consideration of tap changer position for correcting secondary CT current. Performanc...

  7. SedCT: MATLAB™ tools for standardized and quantitative processing of sediment core computed tomography (CT) data collected using a medical CT scanner

    Science.gov (United States)

    Reilly, B. T.; Stoner, J. S.; Wiest, J.

    2017-08-01

    Computed tomography (CT) of sediment cores allows for high-resolution images, three-dimensional volumes, and down core profiles. These quantitative data are generated through the attenuation of X-rays, which are sensitive to sediment density and atomic number, and are stored in pixels as relative gray scale values or Hounsfield units (HU). We present a suite of MATLAB™ tools specifically designed for routine sediment core analysis as a means to standardize and better quantify the products of CT data collected on medical CT scanners. SedCT uses a graphical interface to process Digital Imaging and Communications in Medicine (DICOM) files, stitch overlapping scanned intervals, and create down core HU profiles in a manner robust to normal coring imperfections. Utilizing a random sampling technique, SedCT reduces data size and allows for quick processing on typical laptop computers. SedCTimage uses a graphical interface to create quality tiff files of CT slices that are scaled to a user-defined HU range, preserving the quantitative nature of CT images and easily allowing for comparison between sediment cores with different HU means and variance. These tools are presented along with examples from lacustrine and marine sediment cores to highlight the robustness and quantitative nature of this method.

  8. Étude par co-simulation du principe d'une Interconnexion RF associée à un multiplexage CDMA

    OpenAIRE

    Mombo Boussougou, Yves Constant; Le Gouguec, Thierry; Quéré, Yves; Huret, Fabrice

    2009-01-01

    National audience; Dans ce papier nous développons de nouvelles interconnexions, de type radiofréquences, pour remplacer les interconnexions classiques de circuits numériques. A l'aide d'outils de co simulation, nous avons modélisé ce principe d'interconnexion associé à un multiplexage numérique de type CDMA et une modulation d'amplitude. A titre d'exemple, nous présentons la réponse fréquentielle d'un canal radiofréquence ainsi que les différents signaux observables le long de la chaine. Cet...

  9. EPPRD: An Efficient Privacy-Preserving Power Requirement and Distribution Aggregation Scheme for a Smart Grid.

    Science.gov (United States)

    Zhang, Lei; Zhang, Jing

    2017-08-07

    A Smart Grid (SG) facilitates bidirectional demand-response communication between individual users and power providers with high computation and communication performance but also brings about the risk of leaking users' private information. Therefore, improving the individual power requirement and distribution efficiency to ensure communication reliability while preserving user privacy is a new challenge for SG. Based on this issue, we propose an efficient and privacy-preserving power requirement and distribution aggregation scheme (EPPRD) based on a hierarchical communication architecture. In the proposed scheme, an efficient encryption and authentication mechanism is proposed for better fit to each individual demand-response situation. Through extensive analysis and experiment, we demonstrate how the EPPRD resists various security threats and preserves user privacy while satisfying the individual requirement in a semi-honest model; it involves less communication overhead and computation time than the existing competing schemes.

  10. On a two-pass scheme without a faraday mirror for free-space relativistic quantum cryptography

    Energy Technology Data Exchange (ETDEWEB)

    Kravtsov, K. S.; Radchenko, I. V. [Russian Academy of Sciences, Prokhorov General Physics Institute (Russian Federation); Korol' kov, A. V. [Academy of Cryptography (Russian Federation); Kulik, S. P., E-mail: sergei.kulik@gmail.com [Moscow State University (Russian Federation); Molotkov, S. N., E-mail: sergei.molotkov@gmail.com [Academy of Cryptography (Russian Federation)

    2013-05-15

    The stability of destructive interference independent of the input polarization and the state of a quantum communication channel in fiber optic systems used in quantum cryptography plays a principal role in providing the security of communicated keys. A novel optical scheme is proposed that can be used both in relativistic quantum cryptography for communicating keys in open space and for communicating them over fiber optic lines. The scheme ensures stability of destructive interference and admits simple automatic balancing of a fiber interferometer.

  11. On a two-pass scheme without a faraday mirror for free-space relativistic quantum cryptography

    International Nuclear Information System (INIS)

    Kravtsov, K. S.; Radchenko, I. V.; Korol’kov, A. V.; Kulik, S. P.; Molotkov, S. N.

    2013-01-01

    The stability of destructive interference independent of the input polarization and the state of a quantum communication channel in fiber optic systems used in quantum cryptography plays a principal role in providing the security of communicated keys. A novel optical scheme is proposed that can be used both in relativistic quantum cryptography for communicating keys in open space and for communicating them over fiber optic lines. The scheme ensures stability of destructive interference and admits simple automatic balancing of a fiber interferometer.

  12. PET/CT (and CT) instrumentation, image reconstruction and data transfer for radiotherapy planning

    DEFF Research Database (Denmark)

    Sattler, Bernhard; Lee, John A; Lonsdale, Markus

    2010-01-01

    -invasive imaging technique, offers the visualization and quantification of pre-selected tracer metabolism. In combination with the structural information from CT, this molecular imaging technique has great potential to support and improve the outcome of the treatment-planning procedure prior to radiotherapy......, the DICOM-Standard provides objects and classes for this purpose (DICOM RT). Furthermore, the standard DICOM objects and classes for nuclear medicine (NM, PT) and computed tomography (CT) are used to communicate the actual image data created by the modalities. Care must be taken for data security...

  13. A CDMA Spotbeam Architecture for the Next Generation Satellite System (NGSS) for the Aeronautical Telecommunications Network (ATN)

    Science.gov (United States)

    Raghavan, Rajesh S.; Shamma, Mohammed A.

    2003-01-01

    This paper will present work being done to model and simulate a CDMA based Mobile Satellite System architecture for providing all or part of the future Air Traffic Management (ATM) services. Such a system, will help in relieving the dependence on ground based networks, if not eliminate it. Additionally such an architecture can be used in parallel or as a supplementary service along with ground based links to help alleviate any capacity bottlenecks, or in areas where such services are difficult to make available such as in oceanic, remote areas outside the jet highways, or in developing countries where ground services are less available.

  14. Cardiac cone-beam CT

    International Nuclear Information System (INIS)

    Manzke, Robert

    2005-01-01

    This doctoral thesis addresses imaging of the heart with retrospectively gated helical cone-beam computed tomography (CT). A thorough review of the CT reconstruction literature is presented in combination with a historic overview of cardiac CT imaging and a brief introduction to other cardiac imaging modalities. The thesis includes a comprehensive chapter about the theory of CT reconstruction, familiarizing the reader with the problem of cone-beam reconstruction. The anatomic and dynamic properties of the heart are outlined and techniques to derive the gating information are reviewed. With the extended cardiac reconstruction (ECR) framework, a new approach is presented for the heart-rate-adaptive gated helical cardiac cone-beam CT reconstruction. Reconstruction assessment criteria such as the temporal resolution, the homogeneity in terms of the cardiac phase, and the smoothness at cycle-to-cycle transitions are developed. Several reconstruction optimization approaches are described: An approach for the heart-rate-adaptive optimization of the temporal resolution is presented. Streak artifacts at cycle-to-cycle transitions can be minimized by using an improved cardiac weighting scheme. The optimal quiescent cardiac phase for the reconstruction can be determined automatically with the motion map technique. Results for all optimization procedures applied to ECR are presented and discussed based on patient and phantom data. The ECR algorithm is analyzed for larger detector arrays of future cone-beam systems throughout an extensive simulation study based on a four-dimensional cardiac CT phantom. The results of the scientific work are summarized and an outlook proposing future directions is given. The presented thesis is available for public download at www.cardiac-ct.net

  15. MULTIMEDIA DATA TRANSMISSION THROUGH TCP/IP USING HASH BASED FEC WITH AUTO-XOR SCHEME

    OpenAIRE

    R. Shalin; D. Kesavaraja

    2012-01-01

    The most preferred mode for communication of multimedia data is through the TCP/IP protocol. But on the other hand the TCP/IP protocol produces huge packet loss unavoidable due to network traffic and congestion. In order to provide a efficient communication it is necessary to recover the loss of packets. The proposed scheme implements Hash based FEC with auto XOR scheme for this purpose. The scheme is implemented through Forward error correction, MD5 and XOR for providing efficient transmissi...

  16. Fast reconstruction of industry CT image based on Wintel and P4 structure

    CERN Document Server

    Su Jian Ping; Zhang Li; Zhao Zi Ran; Gao Wen Huan; Kang Ke Jun

    2002-01-01

    Largescale I-CT is used to inspect large workpiece with high spiral resolution and its reconstructed image is very large. So it often relies on special workstation. Now with the development of P4 CPU and Windows2000, it is possible to reconstruct, deal and display I-CT image on Wintel structure. The authors discuss the possibility and future of this scheme. This is important for the improvement of economical value of I-CT

  17. Perpheral bronchopleural fistula: CT evaluation in 22 patients

    International Nuclear Information System (INIS)

    Lee, Ye Ri; Kim, Min Young; Choi, Seong Hee; Kim, Eung Jo; Lee, Jin Joo; Kim, Oak

    1999-01-01

    To determine the usefulness of CT for the evaluation of peripheral bronchopleural fistulas. CT scans of 22 patients with persistent air leak, as seen on serial chest PA, and a clinical history, were retrospectively evaluated. We determined the visibility of direct communication between the lung and pleural space, and the frequency and location of this, and if direct communications were not visualized the probable cause. A bronchopleural fistula(n=13) or its probable cause(n=6) was visualized in 19 patients(86%). Direct communications between the lung and pleural space were seen in 13 patients(59%) ; there were six cases of tuberculous empyema, three of tuberculosis, two of necrotizing empyema, one of trauma, and one of postobstructive pneumonitis. In six patients, bronchiectatic change in peripheral lung adjacent to the pleural cavity was noted, and although this was seen as a probable cause of bronchopleural fistula, direct communication was invisible. Bronchopleural fistula or its probable cause was multiple in 18 of 19 patients, involving the upper and lower lobe in eight, the upper in nine, and the lower in two. CT is useful for evaluating the presence of bronchopleural fistula, and its frequency and location, and in patients in whom the fistula is not directly visualized, the cause of this

  18. An efficient quantum scheme for Private Set Intersection

    Science.gov (United States)

    Shi, Run-hua; Mu, Yi; Zhong, Hong; Cui, Jie; Zhang, Shun

    2016-01-01

    Private Set Intersection allows a client to privately compute set intersection with the collaboration of the server, which is one of the most fundamental and key problems within the multiparty collaborative computation of protecting the privacy of the parties. In this paper, we first present a cheat-sensitive quantum scheme for Private Set Intersection. Compared with classical schemes, our scheme has lower communication complexity, which is independent of the size of the server's set. Therefore, it is very suitable for big data services in Cloud or large-scale client-server networks.

  19. Asynchronous Channel-Hopping Scheme under Jamming Attacks

    Directory of Open Access Journals (Sweden)

    Yongchul Kim

    2018-01-01

    Full Text Available Cognitive radio networks (CRNs are considered an attractive technology to mitigate inefficiency in the usage of licensed spectrum. CRNs allow the secondary users (SUs to access the unused licensed spectrum and use a blind rendezvous process to establish communication links between SUs. In particular, quorum-based channel-hopping (CH schemes have been studied recently to provide guaranteed blind rendezvous in decentralized CRNs without using global time synchronization. However, these schemes remain vulnerable to jamming attacks. In this paper, we first analyze the limitations of quorum-based rendezvous schemes called asynchronous channel hopping (ACH. Then, we introduce a novel sequence sensing jamming attack (SSJA model in which a sophisticated jammer can dramatically reduce the rendezvous success rates of ACH schemes. In addition, we propose a fast and robust asynchronous rendezvous scheme (FRARS that can significantly enhance robustness under jamming attacks. Our numerical results demonstrate that the performance of the proposed scheme vastly outperforms the ACH scheme when there are security concerns about a sequence sensing jammer.

  20. Lightweight Data Aggregation Scheme against Internal Attackers in Smart Grid Using Elliptic Curve Cryptography

    Directory of Open Access Journals (Sweden)

    Debiao He

    2017-01-01

    Full Text Available Recent advances of Internet and microelectronics technologies have led to the concept of smart grid which has been a widespread concern for industry, governments, and academia. The openness of communications in the smart grid environment makes the system vulnerable to different types of attacks. The implementation of secure communication and the protection of consumers’ privacy have become challenging issues. The data aggregation scheme is an important technique for preserving consumers’ privacy because it can stop the leakage of a specific consumer’s data. To satisfy the security requirements of practical applications, a lot of data aggregation schemes were presented over the last several years. However, most of them suffer from security weaknesses or have poor performances. To reduce computation cost and achieve better security, we construct a lightweight data aggregation scheme against internal attackers in the smart grid environment using Elliptic Curve Cryptography (ECC. Security analysis of our proposed approach shows that it is provably secure and can provide confidentiality, authentication, and integrity. Performance analysis of the proposed scheme demonstrates that both computation and communication costs of the proposed scheme are much lower than the three previous schemes. As a result of these aforementioned benefits, the proposed lightweight data aggregation scheme is more practical for deployment in the smart grid environment.

  1. An enhanced dynamic ID-based authentication scheme for telecare medical information systems

    Directory of Open Access Journals (Sweden)

    Ankita Chaturvedi

    2017-01-01

    Full Text Available The authentication schemes for telecare medical information systems (TMIS try to ensure secure and authorized access. ID-based authentication schemes address secure communication, but privacy is not properly addressed. In recent times, dynamic ID-based remote user authentication schemes for TMIS have been presented to protect user’s privacy. The dynamic ID-based authentication schemes efficiently protect the user’s privacy. Unfortunately, most of the existing dynamic ID-based authentication schemes for TMIS ignore the input verifying condition. This makes login and password change phases inefficient. Inefficiency of the password change phase may lead to denial of service attack in the case of incorrect input in the password change phase. To overcome these weaknesses, we proposed a new dynamic ID-based authentication scheme using a smart card. The proposed scheme can quickly detect incorrect inputs which makes the login and password change phase efficient. We adopt the approach with the aim to protect privacy, and efficient login and password change phases. The proposed scheme also resists off-line password guessing attack and denial of service attack. We also demonstrate the validity of the proposed scheme by utilizing the widely-accepted BAN (Burrows, Abadi, and Needham logic. In addition, our scheme is comparable in terms of the communication and computational overheads with relevant schemes for TMIS.

  2. Vision communications based on LED array and imaging sensor

    Science.gov (United States)

    Yoo, Jong-Ho; Jung, Sung-Yoon

    2012-11-01

    In this paper, we propose a brand new communication concept, called as "vision communication" based on LED array and image sensor. This system consists of LED array as a transmitter and digital device which include image sensor such as CCD and CMOS as receiver. In order to transmit data, the proposed communication scheme simultaneously uses the digital image processing and optical wireless communication scheme. Therefore, the cognitive communication scheme is possible with the help of recognition techniques used in vision system. By increasing data rate, our scheme can use LED array consisting of several multi-spectral LEDs. Because arranged each LED can emit multi-spectral optical signal such as visible, infrared and ultraviolet light, the increase of data rate is possible similar to WDM and MIMO skills used in traditional optical and wireless communications. In addition, this multi-spectral capability also makes it possible to avoid the optical noises in communication environment. In our vision communication scheme, the data packet is composed of Sync. data and information data. Sync. data is used to detect the transmitter area and calibrate the distorted image snapshots obtained by image sensor. By making the optical rate of LED array be same with the frame rate (frames per second) of image sensor, we can decode the information data included in each image snapshot based on image processing and optical wireless communication techniques. Through experiment based on practical test bed system, we confirm the feasibility of the proposed vision communications based on LED array and image sensor.

  3. Separation of left and right lungs using 3D information of sequential CT images and a guided dynamic programming algorithm

    Science.gov (United States)

    Park, Sang Cheol; Leader, Joseph Ken; Tan, Jun; Lee, Guee Sang; Kim, Soo Hyung; Na, In Seop; Zheng, Bin

    2011-01-01

    Objective this article presents a new computerized scheme that aims to accurately and robustly separate left and right lungs on CT examinations. Methods we developed and tested a method to separate the left and right lungs using sequential CT information and a guided dynamic programming algorithm using adaptively and automatically selected start point and end point with especially severe and multiple connections. Results the scheme successfully identified and separated all 827 connections on the total 4034 CT images in an independent testing dataset of CT examinations. The proposed scheme separated multiple connections regardless of their locations, and the guided dynamic programming algorithm reduced the computation time to approximately 4.6% in comparison with the traditional dynamic programming and avoided the permeation of the separation boundary into normal lung tissue. Conclusions The proposed method is able to robustly and accurately disconnect all connections between left and right lungs and the guided dynamic programming algorithm is able to remove redundant processing. PMID:21412104

  4. The effect of skin thickness determined using breast CT on mammographic dosimetry

    International Nuclear Information System (INIS)

    Huang Shihying; Boone, John M.; Yang, Kai; Kwan, Alexander L. C.; Packard, Nathan J.

    2008-01-01

    The effect of breast skin thickness on dosimetry in mammography was investigated. Breast computed tomography (CT) acquisition techniques, combined with algorithms designed for determining specific breast metrics, were useful for estimating skin thickness. A radial-geometry edge detection scheme was implemented on coronal reconstructed breast CT (bCT) images to measure the breast skin thickness. Skin thickness of bilateral bCT volume data from 49 women and unilateral bCT volume data from 2 women (10 healthy women and 41 women with BIRADS 4 and 5 diagnoses) was robustly measured with the edge detection scheme. The mean breast skin thickness (±inter-breast standard deviation) was found to be 1.45±0.30 mm. Since most current published normalized glandular dose (D gN ) coefficients are based on the assumption of a 4-mm breast skin thickness, the D gN values computed with Monte Carlo techniques will increase up to 18% due to the thinner skin layers (e.g., 6-cm 50% glandular breast, 28 kVp Mo-Mo spectrum). The thinner skin dimensions found in this study suggest that the current D gN values used for mammographic dosimetry lead to a slight underestimate in glandular dose

  5. Quantum Secure Direct Communication Using W State

    International Nuclear Information System (INIS)

    Dong Li; Xiu Xiaoming; Gao Yajun; Chi Feng

    2008-01-01

    A theoretical scheme of quantum secure direct communication using teleportation is proposed. In the scheme, the sender needs to prepare a class of three-particle W states to use as quantum channel. The two communicators may communicate after they test the security of the quantum channel. The security of the protocol is ensured by quantum entanglement and quantum no-cloning theorem. The receiver can obtain the secret message determinately if the quantum channel is secure

  6. Certificateless Key-Insulated Generalized Signcryption Scheme without Bilinear Pairings

    Directory of Open Access Journals (Sweden)

    Caixue Zhou

    2017-01-01

    Full Text Available Generalized signcryption (GSC can be applied as an encryption scheme, a signature scheme, or a signcryption scheme with only one algorithm and one key pair. A key-insulated mechanism can resolve the private key exposure problem. To ensure the security of cloud storage, we introduce the key-insulated mechanism into GSC and propose a concrete scheme without bilinear pairings in the certificateless cryptosystem setting. We provide a formal definition and a security model of certificateless key-insulated GSC. Then, we prove that our scheme is confidential under the computational Diffie-Hellman (CDH assumption and unforgeable under the elliptic curve discrete logarithm (EC-DL assumption. Our scheme also supports both random-access key update and secure key update. Finally, we evaluate the efficiency of our scheme and demonstrate that it is highly efficient. Thus, our scheme is more suitable for users who communicate with the cloud using mobile devices.

  7. Strict optical orthogonal codes for purely asynchronous code-division multiple-access applications

    Science.gov (United States)

    Zhang, Jian-Guo

    1996-12-01

    Strict optical orthogonal codes are presented for purely asynchronous optical code-division multiple-access (CDMA) applications. The proposed code can strictly guarantee the peaks of its cross-correlation functions and the sidelobes of any of its autocorrelation functions to have a value of 1 in purely asynchronous data communications. The basic theory of the proposed codes is given. An experiment on optical CDMA systems is also demonstrated to verify the characteristics of the proposed code.

  8. Inter-laboratory comparison of medical computed tomography (CT) scanners for industrial applications in the slaughterhouses

    DEFF Research Database (Denmark)

    Christensen, Lars Bager; Angel, Jais Andreas Breusch

    2013-01-01

    differences in CT performance. The presented Round Robin scheme has demonstrated its potential as such a method. The benefit of the phantom set is that it provides a convenient way of comparing volume determination between different CT scanners. The suggested phantoms are mimicking important carcass features...

  9. Mixing chaos modulations for secure communications in OFDM systems

    Science.gov (United States)

    Seneviratne, Chatura; Leung, Henry

    2017-12-01

    In this paper, we consider a novel chaotic OFDM communication scheme is to improve the physical layer security. By secure communication we refer to physical layer security that provides low probability of detection (LPD)/low probability of intercept (LPI) transmission. A mixture of chaotic modulation schemes is used to generate chaotically modulated symbols for each subcarrier of the OFDM transmitter. At the receiver, different demodulators are combined together for the different modulation schemes for enhanced security. Time domain, frequency domain and statistical randomness tests show that transmit signals are indistinguishable from background noise. BER performance comparison shows that the physical layer security of the proposed scheme comes with a slight performance degradation compared to conventional OFDM communication systems.

  10. Performance Analysis of Blind Subspace-Based Signature Estimation Algorithms for DS-CDMA Systems with Unknown Correlated Noise

    Science.gov (United States)

    Zarifi, Keyvan; Gershman, Alex B.

    2006-12-01

    We analyze the performance of two popular blind subspace-based signature waveform estimation techniques proposed by Wang and Poor and Buzzi and Poor for direct-sequence code division multiple-access (DS-CDMA) systems with unknown correlated noise. Using the first-order perturbation theory, analytical expressions for the mean-square error (MSE) of these algorithms are derived. We also obtain simple high SNR approximations of the MSE expressions which explicitly clarify how the performance of these techniques depends on the environmental parameters and how it is related to that of the conventional techniques that are based on the standard white noise assumption. Numerical examples further verify the consistency of the obtained analytical results with simulation results.

  11. A Simple Exact Error Rate Analysis for DS-CDMA with Arbitrary Pulse Shape in Flat Nakagami Fading

    Science.gov (United States)

    Rahman, Mohammad Azizur; Sasaki, Shigenobu; Kikuchi, Hisakazu; Harada, Hiroshi; Kato, Shuzo

    A simple exact error rate analysis is presented for random binary direct sequence code division multiple access (DS-CDMA) considering a general pulse shape and flat Nakagami fading channel. First of all, a simple model is developed for the multiple access interference (MAI). Based on this, a simple exact expression of the characteristic function (CF) of MAI is developed in a straight forward manner. Finally, an exact expression of error rate is obtained following the CF method of error rate analysis. The exact error rate so obtained can be much easily evaluated as compared to the only reliable approximate error rate expression currently available, which is based on the Improved Gaussian Approximation (IGA).

  12. Functional Evaluation of the Cloud Type Virtual Policy Based Network Management Scheme for the Common Use between Plural Organizations

    Directory of Open Access Journals (Sweden)

    Kazuya Odagiri

    2017-03-01

    Full Text Available In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM. This is the scheme for managing a whole Local Area Network (LAN through communication control for every user. In this PBNM, two types of schemes exist. The first is the scheme for managing the whole LAN by locating the communication control mechanisms on the path between network servers and clients. The second is the scheme of managing the whole LAN by locating the communication control mechanisms on clients. As the second scheme, we have studied theoretically about the Destination Addressing Control System (DACS Scheme. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, as the progression phase of the third phase for the last goal, we perform the functional evaluation of the cloud type virtual PBNM, which can be used by plural organizations.

  13. A General Scheme for Information Interception in the Ping-Pong Protocol

    Directory of Open Access Journals (Sweden)

    Piotr Zawadzki

    2016-01-01

    Full Text Available The existence of undetectable eavesdropping of dense coded information has been already demonstrated by Pavičić for the quantum direct communication based on the ping-pong paradigm. However, (a the explicit scheme of the circuit is only given and no design rules are provided; (b the existence of losses is implicitly assumed; (c the attack has been formulated against qubit based protocol only and it is not clear whether it can be adapted to higher dimensional systems. These deficiencies are removed in the presented contribution. A new generic eavesdropping scheme built on a firm theoretical background is proposed. In contrast to the previous approach, it does not refer to the properties of the vacuum state, so it is fully consistent with the absence of losses assumption. Moreover, the scheme applies to the communication paradigm based on signal particles of any dimensionality. It is also shown that some well known attacks are special cases of the proposed scheme.

  14. A hybrid pi control scheme for airship hovering

    International Nuclear Information System (INIS)

    Ashraf, Z.; Choudhry, M.A.; Hanif, A.

    2012-01-01

    Airship provides us many attractive applications in aerospace industry including transportation of heavy payloads, tourism, emergency management, communication, hover and vision based applications. Hovering control of airship has many utilizations in different engineering fields. However, it is a difficult problem to sustain the hover condition maintaining controllability. So far, different solutions have been proposed in literature but most of them are difficult in analysis and implementation. In this paper, we have presented a simple and efficient scheme to design a multi input multi output hybrid PI control scheme for airship. It can maintain stability of the plant by rejecting disturbance inputs to ensure robustness. A control scheme based on feedback theory is proposed that uses principles of optimality with integral action for hovering applications. Simulations are carried out in MTALAB for examining the proposed control scheme for hovering in different wind conditions. Comparison of the technique with an existing scheme is performed, describing the effectiveness of control scheme. (author)

  15. Hybrid optical CDMA-FSO communications network under spatially correlated gamma-gamma scintillation

    DEFF Research Database (Denmark)

    Jurado-Navas, Antonio; Raddo, Thiago R.; Garrido-Balsells, José María

    2016-01-01

    In this paper, we propose a new hybrid network solution based on asynchronous optical code-division multiple-access (OCDMA) and free-space optical (FSO) technologies for last-mile access networks, where fiber deployment is impractical. The architecture of the proposed hybrid OCDMA-FSO network...... is thoroughly described. The users access the network in a fully asynchronous manner by means of assigned fast frequency hopping (FFH)-based codes. In the FSO receiver, an equal gain-combining technique is employed along with intensity modulation and direct detection. New analytical formalisms for evaluating...... can successfully achieve error-free ABER levels for the three scenarios considered as long as forward error correction (FEC) algorithms are employed. Therefore, OCDMA-FSO networks can be a prospective alternative to deliver high-speed communication services to access networks with deficient fiber...

  16. Improving Biometric-Based Authentication Schemes with Smart Card Revocation/Reissue for Wireless Sensor Networks.

    Science.gov (United States)

    Moon, Jongho; Lee, Donghoon; Lee, Youngsook; Won, Dongho

    2017-04-25

    User authentication in wireless sensor networks is more difficult than in traditional networks owing to sensor network characteristics such as unreliable communication, limited resources, and unattended operation. For these reasons, various authentication schemes have been proposed to provide secure and efficient communication. In 2016, Park et al. proposed a secure biometric-based authentication scheme with smart card revocation/reissue for wireless sensor networks. However, we found that their scheme was still insecure against impersonation attack, and had a problem in the smart card revocation/reissue phase. In this paper, we show how an adversary can impersonate a legitimate user or sensor node, illegal smart card revocation/reissue and prove that Park et al.'s scheme fails to provide revocation/reissue. In addition, we propose an enhanced scheme that provides efficiency, as well as anonymity and security. Finally, we provide security and performance analysis between previous schemes and the proposed scheme, and provide formal analysis based on the random oracle model. The results prove that the proposed scheme can solve the weaknesses of impersonation attack and other security flaws in the security analysis section. Furthermore, performance analysis shows that the computational cost is lower than the previous scheme.

  17. An improved anonymous authentication scheme for roaming in ubiquitous networks.

    Science.gov (United States)

    Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick; Won, Dongho

    2018-01-01

    With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.'s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al's scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments.

  18. An improved anonymous authentication scheme for roaming in ubiquitous networks.

    Directory of Open Access Journals (Sweden)

    Hakjun Lee

    Full Text Available With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people's lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.'s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al's scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments.

  19. PS-CARA: Context-Aware Resource Allocation Scheme for Mobile Public Safety Networks

    Directory of Open Access Journals (Sweden)

    Zeeshan Kaleem

    2018-05-01

    Full Text Available The fifth-generation (5G communications systems are expecting to support users with diverse quality-of-service (QoS requirements. Beside these requirements, the task with utmost importance is to support the emergency communication services during natural or man-made disasters. Most of the conventional base stations are not properly functional during a disaster situation, so deployment of emergency base stations such as mobile personal cell (mPC is crucial. An mPC having moving capability can move in the disaster area to provide emergency communication services. However, mPC deployment causes severe co-channel interference to the users in its vicinity. The problem in the existing resource allocation schemes is its support for static environment, that does not fit well for mPC. So, a resource allocation scheme for mPC users is desired that can dynamically allocate resources based on users’ location and its connection establishment priority. In this paper, we propose a public safety users priority-based context-aware resource allocation (PS-CARA scheme for users sum-rate maximization in disaster environment. Simulations results demonstrate that the proposed PS-CARA scheme can increase the user average and edge rate around 10.3% and 32.8% , respectively because of context information availability and by prioritizing the public safety users. The simulation results ensure that call blocking probability is also reduced considerably under the PS-CARA scheme.

  20. Nodule detection methods using autocorrelation features on 3D chest CT scans

    International Nuclear Information System (INIS)

    Hara, T.; Zhou, X.; Okura, S.; Fujita, H.; Kiryu, T.; Hoshi, H.

    2007-01-01

    Lung cancer screening using low dose X-ray CT scan has been an acceptable examination to detect cancers at early stage. We have been developing an automated detection scheme for lung nodules on CT scan by using second-order autocorrelation features and the initial performance for small nodules (< 10 mm) shows a high true-positive rate with less than four false-positive marks per case. In this study, an open database of lung images, LIDC (Lung Image Database Consortium), was employed to evaluate our detection scheme as an consistency test. The detection performance for solid and solitary nodules in LIDC, included in the first data set opened by the consortium, was 83% (10/12) true-positive rate with 3.3 false-positive marks per case. (orig.)

  1. Fetal doses to pregnant patients from CT with tube current modulation calculated using Monte Carlo simulations and realistic phantoms

    International Nuclear Information System (INIS)

    Gu, J.; George Xu, X.; Caracappa, P. F.; Liu, B.

    2013-01-01

    To investigate the radiation dose to the fetus using retrospective tube current modulation (TCM) data selected from archived clinical records. This paper describes the calculation of fetal doses using retrospective TCM data and Monte Carlo (MC) simulations. Three TCM schemes were adopted for use with three pregnant patient phantoms. MC simulations were used to model CT scanners, TCM schemes and pregnant patients. Comparisons between organ doses from TCM schemes and those from non-TCM schemes show that these three TCM schemes reduced fetal doses by 14, 18 and 25 %, respectively. These organ doses were also compared with those from ImPACT calculation. It is found that the difference between the calculated fetal dose and the ImPACT reported dose is as high as 46 %. This work demonstrates methods to study organ doses from various TCM protocols and potential ways to improve the accuracy of CT dose calculation for pregnant patients. (authors)

  2. BVS: A Lightweight Forward and Backward Secure Scheme for PMU Communications in Smart Grid

    Directory of Open Access Journals (Sweden)

    Wei Ren

    2011-01-01

    Full Text Available In smart grid, phaser measurement units (PMUs can upload readings to utility centers via supervisory control and data acquisition (SCADA or energy management system (EMS to enable intelligent controlling and scheduling. It is critical to maintain the secrecy of readings so as to protect customers' privacy, together with integrity and source authentication for the reliability and stability of power scheduling. In particular, appealing security scheme needs to perform well in PMUs that usually have computational resource constraints, thus designed security protocols have to remain lightweight in terms of computation and storage. In this paper, we propose a family of schemes to solve this problem. They are public key based scheme (PKS, password based scheme (PWS and billed value-based scheme (BVS. BVS can achieve forward and backward security and only relies on hash functions. Security analysis justifies that the proposed schemes, especially BVS, can attain the security goals with low computation and storage cost.

  3. CT findings in the leptomeningeal dissemination of tumors

    International Nuclear Information System (INIS)

    Yamazaki, Shingo; Ito, Umeo; Tomita, Hiroki; Takada, Yoshiaki; Ohno, Kikuo; Momma, Seiji; Inaba, Yutaka.

    1986-01-01

    The communicating hydrocephalus, the enhancement of the basal and quadrigeminal cisterns, and the enhancement of the Sylvian fissure, the cortical sulci and the ventricular wall are CT findings reported with regard to the leptomeningeal dissemination of tumors (LMDT). However, these findings are not always observed in patients with LMDT. In the present study, CT findings on 4 patients with LMDT (one from spinal ependymoblastoma, two from gastric cancer; and one from pulmonary cancer) are reported. Depending on the stage of the disease, the appearances of the above LMDT are quite varied. In Case 1, only hydrocephalus was found on admission CT. About one month later, the enhancement of the basal cisterns, the Sylvian fissure, the cerebral sulci, and the ventricular wall was observed, and this enhancement was further intensified later on. In Case 2, the cortical sulci were enhanced without any enhancement of the hydrocephalus or anything else. In Case 3, only the cerebral margin of the posterior lobectomy was enhanced. In Case 4, only a communicating hydrocephalus was observed. However, in all four cases the CSF cytology was positive for tumor cells. The frequency of each CT finding is discussed for the reported 25 cases. (author)

  4. A Bypass-Ring Scheme for a Fault Tolerant Multicast

    Directory of Open Access Journals (Sweden)

    V. Dynda

    2003-01-01

    Full Text Available We present a fault tolerant scheme for recovery from single or multiple node failures in multi-directional multicast trees. The scheme is based on cyclic structures providing alternative paths to eliminate faulty nodes and reroute the traffic. Our scheme is independent of message source and direction in the tree, provides a basis for on-the-fly repair and can be used as a platform for various strategies for reconnecting tree partitions. It only requires an underlying infrastructure to provide a reliable routing service. Although it is described in the context of a message multicast, the scheme can be used universally in all systems using tree-based overlay networks for communication among components.

  5. Efficacy of FDG PET/CT Imaging for Venous Thromboembolic Disorders

    DEFF Research Database (Denmark)

    Hess, Søren; Madsen, Poul Henning; Iversen, Else Dalsgaard

    2015-01-01

    PURPOSE: In recent years, several case reports have described venous thromboembolism (VTE) on FDG PET/CT. In this short communication, we present results from a proof-of-concept pilot study aimed at providing some preliminary data on the efficacy of FDG PET/CT in prospective patients with suspected...

  6. Methods for CT automatic exposure control protocol translation between scanner platforms.

    Science.gov (United States)

    McKenney, Sarah E; Seibert, J Anthony; Lamba, Ramit; Boone, John M

    2014-03-01

    An imaging facility with a diverse fleet of CT scanners faces considerable challenges when propagating CT protocols with consistent image quality and patient dose across scanner makes and models. Although some protocol parameters can comfortably remain constant among scanners (eg, tube voltage, gantry rotation time), the automatic exposure control (AEC) parameter, which selects the overall mA level during tube current modulation, is difficult to match among scanners, especially from different CT manufacturers. Objective methods for converting tube current modulation protocols among CT scanners were developed. Three CT scanners were investigated, a GE LightSpeed 16 scanner, a GE VCT scanner, and a Siemens Definition AS+ scanner. Translation of the AEC parameters such as noise index and quality reference mAs across CT scanners was specifically investigated. A variable-diameter poly(methyl methacrylate) phantom was imaged on the 3 scanners using a range of AEC parameters for each scanner. The phantom consisted of 5 cylindrical sections with diameters of 13, 16, 20, 25, and 32 cm. The protocol translation scheme was based on matching either the volumetric CT dose index or image noise (in Hounsfield units) between two different CT scanners. A series of analytic fit functions, corresponding to different patient sizes (phantom diameters), were developed from the measured CT data. These functions relate the AEC metric of the reference scanner, the GE LightSpeed 16 in this case, to the AEC metric of a secondary scanner. When translating protocols between different models of CT scanners (from the GE LightSpeed 16 reference scanner to the GE VCT system), the translation functions were linear. However, a power-law function was necessary to convert the AEC functions of the GE LightSpeed 16 reference scanner to the Siemens Definition AS+ secondary scanner, because of differences in the AEC functionality designed by these two companies. Protocol translation on the basis of

  7. Code division multiple-access techniques in optical fiber networks. II - Systems performance analysis

    Science.gov (United States)

    Salehi, Jawad A.; Brackett, Charles A.

    1989-08-01

    A technique based on optical orthogonal codes was presented by Salehi (1989) to establish a fiber-optic code-division multiple-access (FO-CDMA) communications system. The results are used to derive the bit error rate of the proposed FO-CDMA system as a function of data rate, code length, code weight, number of users, and receiver threshold. The performance characteristics for a variety of system parameters are discussed. A means of reducing the effective multiple-access interference signal by placing an optical hard-limiter at the front end of the desired optical correlator is presented. Performance calculations are shown for the FO-CDMA with an ideal optical hard-limiter, and it is shown that using a optical hard-limiter would, in general, improve system performance.

  8. In-vivo and ex-vivo assessment of the accuracy of the computer-aided volumetry of porcine kidney in CT images

    Energy Technology Data Exchange (ETDEWEB)

    Cai, W.; Harris, G.; Holalkere, N.; Sahani, D.; Yoshida, H. [Massachusetts General Hospital and Harvard Medical School (United States)

    2007-06-15

    Measurement of kidney volume by computed tomography (CT), called renal volumetry, is indispensable for diagnosis and treatment of kidney-related diseases. Computer-aided volumetry (CAV) of kidney relies on an efficient and accurate segmentation method of the kidney. The purpose of this study is to assess the accuracy of our CAV of kidney scheme using dynamic-threshold (DT) level set method, based on in-vivo and ex-vivo reference standards. Eight Yorkshire breed anesthetized pigs were scanned on a 64-slice multi-detector CT scanner (Sensation 64, Siemens) after an injection of iodinated (300 mgl/ml) contrast agent through an IV cannula. The kidneys of the pigs were then surgically resected and scanned on CT in the same manner. Both in-vivo and ex-vivo CT images were subjected to our volumetry scheme. The resulting volumes of the kidneys were compared with the in-vivo and ex-vivo reference standards: the former was established by manual contouring of the kidneys on the CT images by an experienced radiologist, and the latter was established as the water displacement volume of the resected kidney. Our CAV of kidney scheme demonstrated accurate in-vivo and ex-vivo measurement of kidney volume, despite a large difference between the two reference standards. (orig.)

  9. In-vivo and ex-vivo assessment of the accuracy of the computer-aided volumetry of porcine kidney in CT images

    International Nuclear Information System (INIS)

    Cai, W.; Harris, G.; Holalkere, N.; Sahani, D.; Yoshida, H.

    2007-01-01

    Measurement of kidney volume by computed tomography (CT), called renal volumetry, is indispensable for diagnosis and treatment of kidney-related diseases. Computer-aided volumetry (CAV) of kidney relies on an efficient and accurate segmentation method of the kidney. The purpose of this study is to assess the accuracy of our CAV of kidney scheme using dynamic-threshold (DT) level set method, based on in-vivo and ex-vivo reference standards. Eight Yorkshire breed anesthetized pigs were scanned on a 64-slice multi-detector CT scanner (Sensation 64, Siemens) after an injection of iodinated (300 mgl/ml) contrast agent through an IV cannula. The kidneys of the pigs were then surgically resected and scanned on CT in the same manner. Both in-vivo and ex-vivo CT images were subjected to our volumetry scheme. The resulting volumes of the kidneys were compared with the in-vivo and ex-vivo reference standards: the former was established by manual contouring of the kidneys on the CT images by an experienced radiologist, and the latter was established as the water displacement volume of the resected kidney. Our CAV of kidney scheme demonstrated accurate in-vivo and ex-vivo measurement of kidney volume, despite a large difference between the two reference standards. (orig.)

  10. Quantum secure communication models comparison

    Directory of Open Access Journals (Sweden)

    Georgi Petrov Bebrov

    2017-12-01

    Full Text Available The paper concerns the quantum cryptography, more specifically, the quantum secure communication type of schemes. The main focus here is on making a comparison between the distinct secure quantum communication models – quantum secure direct communication and deterministic secure quantum communication, in terms of three parameters: resource efficiency, eavesdropping check efficiency, and security (degree of preserving the confidentiality.

  11. Adaptive transmission schemes for MISO spectrum sharing systems

    KAUST Repository

    Bouida, Zied

    2013-06-01

    We propose three adaptive transmission techniques aiming to maximize the capacity of a multiple-input-single-output (MISO) secondary system under the scenario of an underlay cognitive radio network. In the first scheme, namely the best antenna selection (BAS) scheme, the antenna maximizing the capacity of the secondary link is used for transmission. We then propose an orthogonal space time bloc code (OSTBC) transmission scheme using the Alamouti scheme with transmit antenna selection (TAS), namely the TAS/STBC scheme. The performance improvement offered by this scheme comes at the expense of an increased complexity and delay when compared to the BAS scheme. As a compromise between these schemes, we propose a hybrid scheme using BAS when only one antenna verifies the interference condition and TAS/STBC when two or more antennas are illegible for communication. We first derive closed-form expressions of the statistics of the received signal-to-interference-and-noise ratio (SINR) at the secondary receiver (SR). These results are then used to analyze the performance of the proposed techniques in terms of the average spectral efficiency, the average number of transmit antennas, and the average bit error rate (BER). This performance is then illustrated via selected numerical examples. © 2013 IEEE.

  12. Single-slice rebinning method for helical cone-beam CT

    International Nuclear Information System (INIS)

    Noo, F.; Defrise, M.; Clackdoyle, R.

    1999-01-01

    In this paper, we present reconstruction results from helical cone-beam CT data, obtained using a simple and fast algorithm, which we call the CB-SSRB algorithm. This algorithm combines the single-slice rebinning method of PET imaging with the weighting schemes of spiral CT algorithms. The reconstruction is approximate but can be performed using 2D multislice fan-beam filtered backprojection. The quality of the results is surprisingly good, and far exceeds what one might expect, even when the pitch of the helix is large. In particular, with this algorithm comparable quality is obtained using helical cone-beam data with a normalized pitch of 10 to that obtained using standard spiral CT reconstruction with a normalized pitch of 2. (author)

  13. An improved anonymous authentication scheme for roaming in ubiquitous networks

    Science.gov (United States)

    Lee, Hakjun; Lee, Donghoon; Moon, Jongho; Jung, Jaewook; Kang, Dongwoo; Kim, Hyoungshick

    2018-01-01

    With the evolution of communication technology and the exponential increase of mobile devices, the ubiquitous networking allows people to use our data and computing resources anytime and everywhere. However, numerous security concerns and complicated requirements arise as these ubiquitous networks are deployed throughout people’s lives. To meet the challenge, the user authentication schemes in ubiquitous networks should ensure the essential security properties for the preservation of the privacy with low computational cost. In 2017, Chaudhry et al. proposed a password-based authentication scheme for the roaming in ubiquitous networks to enhance the security. Unfortunately, we found that their scheme remains insecure in its protection of the user privacy. In this paper, we prove that Chaudhry et al.’s scheme is vulnerable to the stolen-mobile device and user impersonation attacks, and its drawbacks comprise the absence of the incorrect login-input detection, the incorrectness of the password change phase, and the absence of the revocation provision. Moreover, we suggest a possible way to fix the security flaw in Chaudhry et al’s scheme by using the biometric-based authentication for which the bio-hash is applied in the implementation of a three-factor authentication. We prove the security of the proposed scheme with the random oracle model and formally verify its security properties using a tool named ProVerif, and analyze it in terms of the computational and communication cost. The analysis result shows that the proposed scheme is suitable for resource-constrained ubiquitous environments. PMID:29505575

  14. Optimal linear precoding for indoor visible light communication system

    KAUST Repository

    Sifaou, Houssem

    2017-07-31

    Visible light communication (VLC) is an emerging technique that uses light-emitting diodes (LED) to combine communication and illumination. It is considered as a promising scheme for indoor wireless communication that can be deployed at reduced costs while offering high data rate performance. In this paper, we focus on the design of the downlink of a multi-user VLC system. Inherent to multi-user systems is the interference caused by the broadcast nature of the medium. Linear precoding based schemes are among the most popular solutions that have recently been proposed to mitigate inter-user interference. This paper focuses on the design of the optimal linear precoding scheme that solves the max-min signal-to-interference-plus-noise ratio (SINR) problem. The performance of the proposed precoding scheme is studied under different working conditions and compared with the classical zero-forcing precoding. Simulations have been provided to illustrate the high gain of the proposed scheme.

  15. Partial volume and aliasing artefacts in helical cone-beam CT

    International Nuclear Information System (INIS)

    Zou Yu; Sidky, Emil Y; Pan, Xiaochuan

    2004-01-01

    A generalization of the quasi-exact algorithms of Kudo et al (2000 IEEE Trans. Med. Imaging 19 902-21) is developed that allows for data acquisition in a 'practical' frame for clinical diagnostic helical, cone-beam computed tomography (CT). The algorithm is investigated using data that model nonlinear partial volume averaging. This investigation leads to an understanding of aliasing artefacts in helical, cone-beam CT image reconstruction. An ad hoc scheme is proposed to mitigate artefacts due to the nonlinear partial volume and aliasing artefacts

  16. Decentralized Economic Dispatch Scheme With Online Power Reserve for Microgrids

    DEFF Research Database (Denmark)

    Nutkani, I. U.; Loh, Poh Chiang; Wang, P.

    2017-01-01

    Decentralized economic operation schemes have several advantages when compared with the traditional centralized management system for microgrids. Specifically, decentralized schemes are more flexible, less computationally intensive, and easier to implement without relying on communication...... costs, their power ratings, and other necessary constraints, before deciding the DG dispatch priorities and droop characteristics. The proposed scheme also allows online power reserve to be set and regulated within the microgrid. This, together with the generation cost saved, has been verified...... infrastructure. Economic operation of existing decentralized schemes is also usually achieved by either tuning the droop characteristics of distributed generators (DGs) or prioritizing their dispatch order. For the latter, an earlier scheme has tried to prioritize the DG dispatch based on their no...

  17. Pediatric CT quality management and improvement program

    International Nuclear Information System (INIS)

    Larson, David B.; Chan, Frandics P.; Newman, Beverley; Fleischmann, Dominik; Molvin, Lior Z.; Wang, Jia

    2014-01-01

    Modern CT is a powerful yet increasingly complex technology that continues to rapidly evolve; optimal clinical implementation as well as appropriate quality management and improvement in CT are challenging but attainable. This article outlines the organizational structure on which a CT quality management and improvement program can be built, followed by a discussion of common as well as pediatric-specific challenges. Organizational elements of a CT quality management and improvement program include the formulation of clear objectives; definition of the roles and responsibilities of key personnel; implementation of a technologist training, coaching and feedback program; and use of an efficient and accurate monitoring system. Key personnel and roles include a radiologist as the CT director, a qualified CT medical physicist, as well as technologists with specific responsibilities and adequate time dedicated to operation management, CT protocol management and CT technologist education. Common challenges in managing a clinical CT operation are related to the complexity of newly introduced technology, of training and communication and of performance monitoring. Challenges specific to pediatric patients include the importance of including patient size in protocol and dose considerations, a lower tolerance for error in these patients, and a smaller sample size from which to learn and improve. (orig.)

  18. Pediatric CT quality management and improvement program

    Energy Technology Data Exchange (ETDEWEB)

    Larson, David B.; Chan, Frandics P.; Newman, Beverley; Fleischmann, Dominik [Stanford University School of Medicine, Department of Radiology, Stanford, CA (United States); Molvin, Lior Z. [Stanford Hospital and Clinics, Stanford, CA (United States); Wang, Jia [Stanford University, Environmental Health and Safety, Stanford, CA (United States)

    2014-10-15

    Modern CT is a powerful yet increasingly complex technology that continues to rapidly evolve; optimal clinical implementation as well as appropriate quality management and improvement in CT are challenging but attainable. This article outlines the organizational structure on which a CT quality management and improvement program can be built, followed by a discussion of common as well as pediatric-specific challenges. Organizational elements of a CT quality management and improvement program include the formulation of clear objectives; definition of the roles and responsibilities of key personnel; implementation of a technologist training, coaching and feedback program; and use of an efficient and accurate monitoring system. Key personnel and roles include a radiologist as the CT director, a qualified CT medical physicist, as well as technologists with specific responsibilities and adequate time dedicated to operation management, CT protocol management and CT technologist education. Common challenges in managing a clinical CT operation are related to the complexity of newly introduced technology, of training and communication and of performance monitoring. Challenges specific to pediatric patients include the importance of including patient size in protocol and dose considerations, a lower tolerance for error in these patients, and a smaller sample size from which to learn and improve. (orig.)

  19. A Pattern Construction Scheme for Neural Network-Based Cognitive Communication

    Directory of Open Access Journals (Sweden)

    Ozgur Orcay

    2011-01-01

    Full Text Available Inefficient utilization of the frequency spectrum due to conventional regulatory limitations and physical performance limiting factors, mainly the Signal to Noise Ratio (SNR, are prominent restrictions in digital wireless communication. Pattern Based Communication System (PBCS is an adaptive and perceptual communication method based on a Cognitive Radio (CR approach. It intends an SNR oriented cognition mechanism in the physical layer for improvement of Link Spectral Efficiency (LSE. The key to this system is construction of optimal communication signals, which consist of encoded data in different pattern forms (waveforms depending on spectral availabilities. The signals distorted in the communication medium are recovered according to the pre-trained pattern glossary by the perceptual receiver. In this study, we have shown that it is possible to improve the bandwidth efficiency when largely uncorrelated signal patterns are chosen in order to form a glossary that represents symbols for different length data groups and the information can be recovered by the Artificial Neural Network (ANN in the receiver site.

  20. Standard practice for digital imaging and communication in nondestructive evaluation (DICONDE) for X-ray computed tomography (CT) test methods

    CERN Document Server

    American Society for Testing and Materials. Philadelphia

    2010-01-01

    1.1 This practice facilitates the interoperability of X-ray computed tomography (CT) imaging equipment by specifying image data transfer and archival storage methods in commonly accepted terms. This document is intended to be used in conjunction with Practice E2339 on Digital Imaging and Communication in Nondestructive Evaluation (DICONDE). Practice E2339 defines an industrial adaptation of the NEMA Standards Publication titled Digital Imaging and Communications in Medicine (DICOM, see http://medical.nema.org), an international standard for image data acquisition, review, storage and archival storage. The goal of Practice E2339, commonly referred to as DICONDE, is to provide a standard that facilitates the display and analysis of NDE test results on any system conforming to the DICONDE standard. Toward that end, Practice E2339 provides a data dictionary and a set of information modules that are applicable to all NDE modalities. This practice supplements Practice E2339 by providing information object definitio...