SlideShare uma empresa Scribd logo
1 de 11
Baixar para ler offline
Network and Complex Systems                                                                   www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 1, No.1, 2011


                      Design and Implementation of Distributed
Space-Frequency to Achieve Cooperative Diversity in Wireless
                                            Relay Networks
                                                     K.S.Srikanth
                         Dept of E.I.E, AITAM, Tekkali -532201, Andhra Pradesh, India.
                                            E-mail: srikanth.dsd@gmail.com
Abstract
Recently, there has been much interest in modulation techniques that can help in achieving transmit
diversity motivated by the increased capacity of multiple-input multiple- output (MIMO) channel. To
achieve transmit diversity the transmitter needs to be equipped with multiple antennas. The antennas should
be well separated to have uncorrelated fading among the different antennas. This results in higher diversity
orders and higher coding gains. However, achieving transmit diversity for mobile units requires cooperative
diversity. In this context, the space-time codes (STC) for spread spectrum CDMA systems have received
great interest in recent times. The schemes presented in this paper ensure that the limitations of
conventional correlation receivers are overcome. The effect of the space-time code distribution on the
space-time code that achieves full diversity with maximum coding gain over MIMO channels is studied in
this paper. In most of the analogous works surveyed so far, it is observed, that, there has been very little
focus on the study of systems that exhibit diversity of all the three forms namely: source coding diversity,
channel coding diversity and user cooperation diversity. However, in this paper, all these three forms of
diversity are uniformly considered and the proposed schemes are studied for their robustness and
performance. It is shown, that, the proposed space-time coded communication scheme is both bandwidth
and power efficient. To analyze the proposed scheme fully, communication over fading channels is
considered. The maximum-likelihood decision metric is used to decode the original information in the
presence of channel estimation errors. A study of the performance of the proposed STC system in the
presence of slowly changing Rayleigh channels is also presented.
Keywords: Multipath fading, Communication systems, Distributed Space-time codes, Wireless relay
networks, Signal Processing, Multinode Cooperative communication, multiple sensor detection systems
1. Introduction
Cooperative diversity can provide a new dimension over which higher diversity orders can be achieved. In
this research work, the design of efficient schemes and protocols that can facilitate several terminals to
cooperate via forwarding each other’s data is proposed. The proposed schemes can increase the system
reliability by achieving spatial cooperative diversity. The focus of this research work is to identify and
devise schemes that can help to tackle the problem of how to achieve and where to exploit diversity in
cooperative networks.
          A spread-spectrum scheme typically consists of the following signal transmission and reception
stages.
1. A pseudo-random code that is different for each channel and each successive connection.
2. The information data which modulates the pseudo-random code (i.e. the data is “spread”).
3. The resulting signal that modulates a carrier.
4. The modulated carrier is amplified and broadcast.
5. The carrier is received and amplified.
6. The received signal is mixed with a local carrier to recover the spread digital signal.
Page | 1
www.iiste.org
Network and Complex Systems                                                                      www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 1, No.1, 2011

7. The receiver acquires the received code and phase locks its own code to it.
8. The received signal is correlated with the generated code, extracting the information data.
         The design of Distributed Space Time Code (DSTC) can mitigate the relay nodes synchronization
errors. However, most of the previous works on cooperative transmission assume perfect synchronization
between the relay nodes. This implies that the relays' timings, carrier frequencies, and propagation delays
are identical. But, perfect synchronization is difficult to achieve among randomly located relay nodes.
The process of acquiring the timing information of the transmitted spread spectrum signal is essential to the
implementation of any form of spread spectrum technique. In figures 1 and 2, the importance of phase
synchronization between the transmitted signal (assuming no noise case) and the locally generated carrier
(PN code) is illustrated. The de-spreader output for case (i) equals the data input, whereas, for case (ii) the
de-spreader output is another random sequence. This is due to the reason that, perfect phase
synchronization is achieved only in case (i).
          Rapid growth in mobile computing and other wireless multimedia services is inspiring many
research and development activities on high-speed wireless communication systems. Main challenges in
this area include the development of efficient coding and modulation signal processing techniques to
improve the quality and spectral efficiency of wireless systems. The recently emerged space-time coding
and signal processing techniques for wireless communication systems employing multiple transmit and
receive antennas offer a powerful paradigm for meeting these challenges. This chapter provides an
overview on the recent use of space-time coding and signal processing techniques for multiple-input
multiple-output (MIMO) communication systems. A review of the information theoretic results on the
capacities of wireless systems employing multiple transmit and receive antennas is presented. Coding and
signal processing techniques for wireless systems employing multiple transmit and receive antennas are
also briefly touched upon.
          The proposed work considers the antenna array used by the space-time code to comprise of
antennas of several geographically separated base stations (i.e. multiple antennas) and hence is more
practical. In the first phase of this paper, the performance of an existing DS-CDMA scheme is studied in the
presence of channel noise and interference. In the second phase, a block-coded Space-time coding scheme
is designed and using a maximum likelihood decision metric at the receiver the decoding is achieved. Block
space-time-codes are considered to reduce algorithmic complexity. A slow fading Rayleigh channel noise is
considered in the simulation study. A major beneficiary of this paper could be in the field of wireless sensor
networks. The concepts presented shall assist in using some of the relay nodes instead of some of the sensor
nodes that are less-informative to the fusion center. These relay nodes can relay the information for the
other more informative sensor nodes. Allowing some relay nodes to forward the measurements of the
more-informative sensors will increase the reliability of these measurements at the expense of sending
fewer measurements to the fusion center. This will create a tradeoff between the number of
measurements sent to the fusion center and the reliability of the more-informative measurements.
2. Two Antenna System
      If two transmit antennas are spread out geographically, the Rayleigh fading becomes uncorrelated
spatially because there is enough separation between the transmit antennas. Furthermore, it can be assumed
that the fading is temporally quasi-static in the sense that, there is no correlation between two consecutive
channel gains.
     Since the mobile station has different distances from each transmit antenna on the downlink, the mean
received signal power at the mobile station is not the same for all paths. One can normalize the distance
between the mobile station and the nearest base station to unity such that all the other distances are greater
than unity.
     Consider the simple case where there are two base stations as shown in figure 3. The normalized
distances are found using



Page | 2
www.iiste.org
Network and Complex Systems                                                                    www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 1, No.1, 2011


                                             d1
                                   d 1, n=
                                             dr

                                              d2
                                    d 2, n=
                                              dr
where dr is the reference distance, which is the distance from the mobile station to the closest base station,
and d1,n and d2,n are the normalized distances. Suppose d1 < d2 and thus dr = d1, so we can normalize d1,n to
be 1 and d2,n is d2/dr. The received signal power is inversely proportional to the distance, so the mean
SNR at each receiver becomes
                    1 = (ES / N0) (d1,n)-n
                    2 = ( ES/ N0) (d2,n)-n
where n is the path loss exponent. For free space, n = 2, and for perfect ground reflection, n = 4. However,
field tests have shown that the path loss exponent is in practice in the range 2  n  4. Thus, n=3 was
chosen in this work during simulation. This can be extended to a typical edge-excited cellular system with
3 transmit antennas located on the edges of the cell.
     If the transmit antennas are placed in the same location, then the fading is highly correlated spatially,
and the simulated system performance is not satisfactory even with block STC.
3. Two-Branch Transmit Diversity With One Receiver
shows the base-band representation of the new two-branch transmit diversity scheme. The scheme uses two
transmit antennas and one receive antenna and may be defined by the following three functions:
    The encoding and transmission sequence of information symbols at the transmitter;
    The combining scheme at the receiver;
    The decision rule for maximum likelihood detection.
            At a given symbol period, two signals are simultaneously transmitted from the two antennas.
The signal transmitted from the antenna zero is denoted by s0 and from antenna one by s1. During the next
symbol period signal (-s1*) is transmitted from antenna zero, and signal s0* is transmitted from antenna one
where * is the complex conjugate operation.
                   The encoding is done in space and time (space-time coding). The encoding, however,
can also be done in space and frequency. Instead of two adjacent symbol periods, two adjacent carriers
may be used (space-frequency coding).
               The channel at time t can be modeled by a complex multiplicative distortion h 0(t) for
transmit antenna zero and h1(t) for transmit antenna one. Assuming that fading is constant across two
consecutive symbols, the values of hi(t) can be written as,
                    h0(t) = h0(t + T) = h0 = 0ej0
                    h1(t) = h1(t + T) = h1= 1ej1
where T is the symbol duration. The received signals can then be expressed as
                 r0 = r(t)     =      h0s0 + h1s1 + n0
                  r1 = r(t+T) = *h0s1* + h1s0 + n1
where r0 and r1 are the received signals at time t and t + T and n0 and n1 are complex random variables
representing receiver noise and interference.
4.The Combining Scheme
The combiner shown in figure 4 builds the following two combined signals that are sent to the maximum
likelihood detector:
Page | 3
www.iiste.org
Network and Complex Systems                                                                   www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 1, No.1, 2011




It is important to note that this combining scheme is different from MRRC. the combiner output is
expressed as




4.1 The Maximum Likelihood Decision Rule
       These combined signals are then sent to the maximum likelihood detector which, for each of the
signals s0 and s1, uses the decision rule for BPSK signals.


The combined signals are equivalent to that obtained from two-branch MRRC. The only difference is the
presence of phase rotations on the noise components which do not degrade the effective SNR. Therefore,
the resulting diversity order from the new two-branch transmit diversity scheme with one receiver is equal
to that of two-branch MRRC.
5. The Proposed Algorithm
Maximum likelihood decoding of any space-time block can be achieved using only linear processing at the
receiver. The maximum likelihood decision amounts to minimizing the decision metric



     over all possible values of s1 and s2. Note that due to the quasi-static nature of the channel, the path
gains are constant over two transmissions. The minimizing values are the receiver estimates of s1 and s2,
respectively. When the above metric is expanded and the terms that are independent of the code words are
deleted then the above minimization is equivalent to minimizing.




The above metric decomposes into two parts, one of which




is only a function of s2. Thus the minimization is equivalent to minimizing these two parts separately. This
in turn is equivalent to minimizing the decision matrix




Page | 4
www.iiste.org
Network and Complex Systems                                                                   www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 1, No.1, 2011


for detecting s1 and the decision metric




for detecting s2.
This is a simple decoding scheme and there is no performance sacrifice for achieving it.
6. DS-CDMA Implementation
         The proposed DS-CDMA scheme is shown in figure 5. The user data from the cell network is
modulated using a pseudo-random code. In order to protect signal, the code used is pseudo-random. It
appears random, but is actually deterministic, so that the receiver can reconstruct the code for synchronous
detection. This pseudo-random code is called pseudo-noise (PN). The digital data is directly coded at a
much higher frequency. The authenticated receiver knows how to generate the same code, and correlates
the received signal with that code to extract the data.
         The Monte- Carlo simulation model used to study the performance of the proposed scheme is
shown in figure 6. Different strengths of interference (represented as A in the plot) are considered and the
probability of error is obtained for varying values of signal to noise ratio.
The performance curves Monte-Carlo simulation model used for the            simulation study of the proposed
scheme are shown in figure 7.
7. Space-Time Codes For Cooperative Diversity
         Space-time coding of CDMA signals offer increased bandwidth and bit rate [10]. A linear block
code is employed in this work. The generator matrix (for the block codes) chosen for the two user data is
                    genmat1= [1 0 0 1 1 0;0 1 0 0 1 1;0 0 1 1 0 1]    and
                    genmat2= [1 0 0 0 1 1;0 1 0 1 0 1;0 0 1 1 1 0].
The results obtained by using the proposed algorithms are discussed in this section. Figure 8 to 12 show the
transmitted two user data, received data with noise, the demodulated and de-spread data for the case of two
transmit antenna and one receive antenna. Similarly figure 8 and 9 shows the probability of detection
of error obtained versus signal to noise ratio for a two-sensor network over wireless fading
channels.
The performance curve i.e. Probability of error Vs SNR plot is shown in figure 13. The curve shows a
significant improvement with very less Probability of error even at low SNRs .
8. Conclusion
          The primary objective of present day’s mobile technologies is to enhance the data rate on
multi-path fading channels. A convincing solution introduced in this research work to achieve this is the use
of multiple antennas in transmission. This thesis report new design schemes for transmitters and receivers
of coded modulations over multiple antenna channels. The objective is to achieve near Shannon capacity
performance over ergodic channels and near outage probability performance over block fading channels.
Iterative joint detection and decoding are applied in the aim of achieving near maximum likelihood
performance. Whenever the wireless channel does not experience a large amount of coupled delay and
angle spread the algorithms proposed in this work can assist in producing a good improvement in
performance with less complex topology. It has been shown in this thesis that coding across both spatial
and temporal domains together achieves a diversity order equal to the product of the number of transmit
and receive antennas.
         The proposed work is the development of architecture for secure communication in mobile
wireless networks. The problem of deploying relay nodes in sensor networks is well
considered in this work.  A system consisting of a set of sensor nodes communicating
Page | 5
www.iiste.org
Network and Complex Systems                                                                  www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 1, No.1, 2011

to a fusion center, where decisions are made, is considered. As some sensor nodes provide
"less-informative" measurements to the fusion center, effective means of assigning the system
resources allocated for these sensors to relay nodes to forward the measurements of the
other "more-informative" sensor nodes is considered in this thesis. This introduces a new tradeoff in
the system design between the number of measurements sent to the fusion center and
the reliability of the more-informative measurements, which is enhanced by deploying more
relay nodes in the network.
          The approach divides the network into clusters and implements a decentralized certification
authority. Decentralization is achieved using threshold cryptography and a network secret that is
distributed over a number of nodes. While this basic idea has been proposed earlier partially, its
application on clustered network is a novelty of the work. The work address issues of authorization,
access control and a multilevel security model and helps to adapt to the complexity of mobile end systems.
It also effectively counteracts the denial of service (DoS) threats and hence, can prolong the life time and
improve robustness of wireless sensor network. To check the validity of algorithms proposed in this thesis,
different test inputs are given and the results are analyzed. The algorithm was validated with uniform
distribution of nodes and also random distributions like Gaussian, Poisson, Rayleigh and Exponential.
Studies related to energy spent in transmission and reception to discover the given topology using the
proposed algorithm is done along with throughput fluctuations. Results obtained show that the schemes
proposed in this work, result in significant dependability improvement for a wireless sensor network.
     The proposed work shall enable a wireless sensor network to consume extremely low power, operate
in high volumetric densities and be dispensable. It is ideally suited to most of the applications that share
similar features such as difficult to access because of geographical location where the network has been
deployed, the large scale of deployment, high mobility and prone to failure. It also ensures that the
wireless sensor network be autonomous and operate unattended, be adaptive to the environment and choose
an optimal number of communicating sensing nodes since too many sensors can generate bottlenecks in the
communication infrastructure when they all compete for bandwidth.
References
H.V. Poor, "Signal Processing         for   Wideband    Communications,"     IEEE     Information   Society
News-letter, June 1992.
C.K.Weber et al., " Performance Considerations of CDMA Systems," IEEE Trans. on Vehicular Technology,
Feb. 1981, pp3-9.
E. Telatar, Capacity of multi-antenna Gaussian channels," European Transactions on Telecommunications,
vol. 10, no. 6, pp. 585{595, Nov./Dec. 1999.
G. J. Foschini and M. Gans, On the limits of wireless communication in a fading environment
when using multiple antennas," Wireless Personal Communication, vol. 6, pp. 311{335, Mar. 1998.
A.Naquib et al, IEEE Transactions on Communication systems, 1998
William et al, IEEE Transactions on Systems, Man and Cybernetics, 1991.
J. Foschini et al,   IEEE Transactions on Communication systems and Engineering, 2003.
V.Tarokh et al, IEEE Transactions on Communication systems, 1998.
W. Su, A. K. Sadek, and K. J. R. Liu, Cooperative communications in wireless networks:
Performance analysis and optimum power allocation," Wireless Personal Communications, vol. 44,
no. 2, pp. 181{217, Jan. 2008.
A. K. Sadek, W. Su, and K. J. R. Liu, Multi-node cooperative communications in wireless
networks," IEEE Trans. Signal Processing, vol. 55, pp.341-355, Jan 2007.




Page | 6
www.iiste.org
Network and Complex Systems                                                                                               www.iiste.org
          ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
          Vol 1, No.1, 2011
                             Data
                                                                                            Data

                                                                                          PN carrier
                        PN carrier


                 Spreader output                                                     Spreader
                                                                                    output
                    Local PN carrier                                             Local PN carrier

                        De-spreader
                          output                                                                                            T
                                                                                  De-spreader
                                                                                  output



              Fig 1 : Phase synchronization is perfect                            Fig 2 : Phase error due to one bit offset
           s                                            s*
tx        - *                                           s tx                                                        s
           0                                            1
antenna 0 s                                             0                                                           0
                                                            antenna 1
          1    h0        =                     h1       =                                     h0 =                              h1 =
               0ej0                          1ej1                                         0e     j
                                                                                                                                1ej
                                        rx                                                    0                                 1
                                        antenna 1
     n                                    interferen
     n
     0                                    ce        &
     1                                                                       n                                                                           n
                                    h     noise combi                                       interf                                  interf
         chann                      h
                                    0           ~ ner       ~           r0
                                                                             0
                                                                                 =          erenc                                   erenc           r1   1=
         h el       h               1
                                                s           s
                                                                        s0h0 +               e&                                     e       &       s0h1 +
         0 estima 1
               Maximum         likelihood detector
                                             0              1                        cha                                                     cha
                                                                                            noise h                                 noise
           tor                                                          n0
                                                                                  nne
                                                                                              h       *                 ~
                                                                                                                        s
                                                                                                                                h   *  h
                                                                                                                                             nne
                                                                                                                                                    n1
                                                                                                  0        0                    1       1
                                                                                      l                            0
                                                                                                               Maximu                           l
                                                                                     esti                          m                         esti
                                                                                     ma                        likelihood                    ma
          Fig 3 The new two-branch transmit                                      Two-branch MRRCV The Proposed Algorithm
                                                                                   tor                           tor
                                                                                                               detector
          diversity scheme with one receiver




          Page | 7
          www.iiste.org
Network and Complex Systems                                                                   www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 1, No.1, 2011

              NOKIA




                      USER 1          MODULATOR
             CELL 1                                                   WIRELESS TX:

                                        PN seq
                                                                                  433.2 MHZ
                                                        INTERLEAVER   MODULATOR


              NOKIA
                                                                        CARRIER

                      USER 2          MODULATOR

            CELL 2

                                        PN 2




                                          SECURE CDMA TX:




                                                           DEMOD      USER 1
ANTENNNA
                                                              PN I

           WIRELESS
                                  DEINTERLEAVER
              RX:

                                                              PN 2

                                                           DEMOD      USER 2




                                          SECURE CDMA RX:

Fig 5 :     Proposed real-time implementation of the CDMA Tx: and Rx




Fig 6 : Monte-Carlo simulation model used for the
           simulation study of the proposed scheme


   0.5
  0.45                                         A = 12
   0.4
  0.35
   0.3                                                  A=7
                               A= 3
   P (e)




  0.25
   0.2
  0.15                 A= 0
   0.1
  0.05
     0
           0 1 2 3 4 5 6 7 8 9 10 11 12
                      SNR (in dB)


Fig7 : Performance graph for the Proposed CDMA
OBSERVATION PLOTS
Page | 8
www.iiste.org
Network and Complex Systems                                                                www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 1, No.1, 2011




Fig 8 BPSK modulated data of user 1 generated
                by antenna 1




Fig 9   BPSK modulated data of user 2
        generated by antenna 2




Fig 10 Space-time coded received signal with noise (obtained with 2 transmit and 1 receive antenna)




Page | 9
www.iiste.org
Network and Complex Systems                      www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 1, No.1, 2011




Fig 11    Demodulated data 1




Fig 12 demodulated data2




   Fig 13. Performance graph for the proposed
          Scheme




Page | 10
www.iiste.org
International Journals Call for Paper
The IISTE, a U.S. publisher, is currently hosting the academic journals listed below. The peer review process of the following journals
usually takes LESS THAN 14 business days and IISTE usually publishes a qualified article within 30 days. Authors should
send their full paper to the following email address. More information can be found in the IISTE website : www.iiste.org

Business, Economics, Finance and Management               PAPER SUBMISSION EMAIL
European Journal of Business and Management               EJBM@iiste.org
Research Journal of Finance and Accounting                RJFA@iiste.org
Journal of Economics and Sustainable Development          JESD@iiste.org
Information and Knowledge Management                      IKM@iiste.org
Developing Country Studies                                DCS@iiste.org
Industrial Engineering Letters                            IEL@iiste.org


Physical Sciences, Mathematics and Chemistry              PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research                      JNSR@iiste.org
Chemistry and Materials Research                          CMR@iiste.org
Mathematical Theory and Modeling                          MTM@iiste.org
Advances in Physics Theories and Applications             APTA@iiste.org
Chemical and Process Engineering Research                 CPER@iiste.org


Engineering, Technology and Systems                       PAPER SUBMISSION EMAIL
Computer Engineering and Intelligent Systems              CEIS@iiste.org
Innovative Systems Design and Engineering                 ISDE@iiste.org
Journal of Energy Technologies and Policy                 JETP@iiste.org
Information and Knowledge Management                      IKM@iiste.org
Control Theory and Informatics                            CTI@iiste.org
Journal of Information Engineering and Applications       JIEA@iiste.org
Industrial Engineering Letters                            IEL@iiste.org
Network and Complex Systems                               NCS@iiste.org


Environment, Civil, Materials Sciences                    PAPER SUBMISSION EMAIL
Journal of Environment and Earth Science                  JEES@iiste.org
Civil and Environmental Research                          CER@iiste.org
Journal of Natural Sciences Research                      JNSR@iiste.org
Civil and Environmental Research                          CER@iiste.org


Life Science, Food and Medical Sciences                   PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research                      JNSR@iiste.org
Journal of Biology, Agriculture and Healthcare            JBAH@iiste.org
Food Science and Quality Management                       FSQM@iiste.org
Chemistry and Materials Research                          CMR@iiste.org


Education, and other Social Sciences                      PAPER SUBMISSION EMAIL
Journal of Education and Practice                         JEP@iiste.org
Journal of Law, Policy and Globalization                  JLPG@iiste.org                       Global knowledge sharing:
New Media and Mass Communication                          NMMC@iiste.org                       EBSCO, Index Copernicus, Ulrich's
Journal of Energy Technologies and Policy                 JETP@iiste.org                       Periodicals Directory, JournalTOCS, PKP
Historical Research Letter                                HRL@iiste.org                        Open Archives Harvester, Bielefeld
                                                                                               Academic Search Engine, Elektronische
Public Policy and Administration Research                 PPAR@iiste.org                       Zeitschriftenbibliothek EZB, Open J-Gate,
International Affairs and Global Strategy                 IAGS@iiste.org                       OCLC WorldCat, Universe Digtial Library ,
Research on Humanities and Social Sciences                RHSS@iiste.org                       NewJour, Google Scholar.

Developing Country Studies                                DCS@iiste.org                        IISTE is member of CrossRef. All journals
Arts and Design Studies                                   ADS@iiste.org                        have high IC Impact Factor Values (ICV).

Mais conteúdo relacionado

Mais procurados

Optimal Transmit Power and Packet Size in Wireless Sensor Networks in Shadowe...
Optimal Transmit Power and Packet Size in Wireless Sensor Networks in Shadowe...Optimal Transmit Power and Packet Size in Wireless Sensor Networks in Shadowe...
Optimal Transmit Power and Packet Size in Wireless Sensor Networks in Shadowe...IDES Editor
 
Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...IDES Editor
 
Indoor Localization Using Local Node Density In Ad Hoc WSNs
Indoor Localization Using Local Node Density In Ad Hoc WSNsIndoor Localization Using Local Node Density In Ad Hoc WSNs
Indoor Localization Using Local Node Density In Ad Hoc WSNsjoaquin_gonzalez
 
Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...
Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...
Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...ijtsrd
 
CP-NR Distributed Range Free Localization Algorithm in WSN
CP-NR Distributed Range Free Localization Algorithm in WSNCP-NR Distributed Range Free Localization Algorithm in WSN
CP-NR Distributed Range Free Localization Algorithm in WSNIJAAS Team
 
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...sipij
 
Rate Adaptation for Time Varying Channels Using Distributed Relay Selection
Rate Adaptation for Time Varying Channels Using Distributed Relay SelectionRate Adaptation for Time Varying Channels Using Distributed Relay Selection
Rate Adaptation for Time Varying Channels Using Distributed Relay Selectionpaperpublications3
 
Cube2012 Submission 359
Cube2012 Submission 359Cube2012 Submission 359
Cube2012 Submission 359Sandeep Saxena
 
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...csandit
 
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...IRJET Journal
 
Security aware relaying scheme for cooperative networks with untrusted relay ...
Security aware relaying scheme for cooperative networks with untrusted relay ...Security aware relaying scheme for cooperative networks with untrusted relay ...
Security aware relaying scheme for cooperative networks with untrusted relay ...Pvrtechnologies Nellore
 
11.performance evaluation of maximal ratio receiver combining diversity with ...
11.performance evaluation of maximal ratio receiver combining diversity with ...11.performance evaluation of maximal ratio receiver combining diversity with ...
11.performance evaluation of maximal ratio receiver combining diversity with ...Alexander Decker
 
Performance evaluation of maximal ratio receiver combining diversity with pri...
Performance evaluation of maximal ratio receiver combining diversity with pri...Performance evaluation of maximal ratio receiver combining diversity with pri...
Performance evaluation of maximal ratio receiver combining diversity with pri...Alexander Decker
 

Mais procurados (18)

Optimal Transmit Power and Packet Size in Wireless Sensor Networks in Shadowe...
Optimal Transmit Power and Packet Size in Wireless Sensor Networks in Shadowe...Optimal Transmit Power and Packet Size in Wireless Sensor Networks in Shadowe...
Optimal Transmit Power and Packet Size in Wireless Sensor Networks in Shadowe...
 
Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...Communication by Whispers Paradigm for Short Range Communication in Cognitive...
Communication by Whispers Paradigm for Short Range Communication in Cognitive...
 
Ijnsa050209
Ijnsa050209Ijnsa050209
Ijnsa050209
 
Ijcnc050207
Ijcnc050207Ijcnc050207
Ijcnc050207
 
Indoor Localization Using Local Node Density In Ad Hoc WSNs
Indoor Localization Using Local Node Density In Ad Hoc WSNsIndoor Localization Using Local Node Density In Ad Hoc WSNs
Indoor Localization Using Local Node Density In Ad Hoc WSNs
 
Bn25384390
Bn25384390Bn25384390
Bn25384390
 
Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...
Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...
Simulation of Direct Sequence Spread Spectrum for Wireless Communication Syst...
 
CP-NR Distributed Range Free Localization Algorithm in WSN
CP-NR Distributed Range Free Localization Algorithm in WSNCP-NR Distributed Range Free Localization Algorithm in WSN
CP-NR Distributed Range Free Localization Algorithm in WSN
 
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...
TARGET LOCALIZATION IN WIRELESS SENSOR NETWORKS BASED ON RECEIVED SIGNAL STRE...
 
Rate Adaptation for Time Varying Channels Using Distributed Relay Selection
Rate Adaptation for Time Varying Channels Using Distributed Relay SelectionRate Adaptation for Time Varying Channels Using Distributed Relay Selection
Rate Adaptation for Time Varying Channels Using Distributed Relay Selection
 
Indoor Localization in Wireless Sensor Networks
Indoor Localization in Wireless Sensor NetworksIndoor Localization in Wireless Sensor Networks
Indoor Localization in Wireless Sensor Networks
 
Cube2012 Submission 359
Cube2012 Submission 359Cube2012 Submission 359
Cube2012 Submission 359
 
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
A SIMULATION-BASED PERFORMANCE COMPARISON OF MANETS CDS CREATION ALGORITHMS U...
 
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
 
Security aware relaying scheme for cooperative networks with untrusted relay ...
Security aware relaying scheme for cooperative networks with untrusted relay ...Security aware relaying scheme for cooperative networks with untrusted relay ...
Security aware relaying scheme for cooperative networks with untrusted relay ...
 
Localization
LocalizationLocalization
Localization
 
11.performance evaluation of maximal ratio receiver combining diversity with ...
11.performance evaluation of maximal ratio receiver combining diversity with ...11.performance evaluation of maximal ratio receiver combining diversity with ...
11.performance evaluation of maximal ratio receiver combining diversity with ...
 
Performance evaluation of maximal ratio receiver combining diversity with pri...
Performance evaluation of maximal ratio receiver combining diversity with pri...Performance evaluation of maximal ratio receiver combining diversity with pri...
Performance evaluation of maximal ratio receiver combining diversity with pri...
 

Semelhante a 11.design and implementation of distributed space frequency to achieve cooperative diversity in wireless relay networks

A low complexity distributed differential scheme based on orthogonal space t...
A low complexity distributed differential scheme based on  orthogonal space t...A low complexity distributed differential scheme based on  orthogonal space t...
A low complexity distributed differential scheme based on orthogonal space t...IJECEIAES
 
Distributed Spatial Modulation based Cooperative Diversity Scheme
Distributed Spatial Modulation based Cooperative Diversity SchemeDistributed Spatial Modulation based Cooperative Diversity Scheme
Distributed Spatial Modulation based Cooperative Diversity Schemeijwmn
 
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...ijistjournal
 
MIMO System Performance Evaluation for High Data Rate Wireless Networks usin...
MIMO System Performance Evaluation for High Data Rate  Wireless Networks usin...MIMO System Performance Evaluation for High Data Rate  Wireless Networks usin...
MIMO System Performance Evaluation for High Data Rate Wireless Networks usin...IJMER
 
Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...Dr Sandeep Kumar Poonia
 
A Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc NetworksA Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc Networkspijans
 
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...ijaceeejournal
 
A Review of Relay selection based Cooperative Wireless Network for Capacity E...
A Review of Relay selection based Cooperative Wireless Network for Capacity E...A Review of Relay selection based Cooperative Wireless Network for Capacity E...
A Review of Relay selection based Cooperative Wireless Network for Capacity E...IRJET Journal
 
CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...
CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...
CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...ijwmn
 
Performance of dsdv protocol based on different propagation model with vari
Performance of dsdv protocol based on different propagation model with variPerformance of dsdv protocol based on different propagation model with vari
Performance of dsdv protocol based on different propagation model with variIAEME Publication
 
Performance evaluation of diff routing protocols in wsn using difft network p...
Performance evaluation of diff routing protocols in wsn using difft network p...Performance evaluation of diff routing protocols in wsn using difft network p...
Performance evaluation of diff routing protocols in wsn using difft network p...Dr Sandeep Kumar Poonia
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Paper id 252014136
Paper id 252014136Paper id 252014136
Paper id 252014136IJRAT
 
A low complex modified golden
A low complex modified goldenA low complex modified golden
A low complex modified goldenIJCNCJournal
 
Optimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor NetworksOptimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor Networkspaperpublications3
 
Prediction of a reliable code for wireless communication systems
Prediction of a reliable code for wireless communication systemsPrediction of a reliable code for wireless communication systems
Prediction of a reliable code for wireless communication systemsIAEME Publication
 

Semelhante a 11.design and implementation of distributed space frequency to achieve cooperative diversity in wireless relay networks (20)

A low complexity distributed differential scheme based on orthogonal space t...
A low complexity distributed differential scheme based on  orthogonal space t...A low complexity distributed differential scheme based on  orthogonal space t...
A low complexity distributed differential scheme based on orthogonal space t...
 
Distributed Spatial Modulation based Cooperative Diversity Scheme
Distributed Spatial Modulation based Cooperative Diversity SchemeDistributed Spatial Modulation based Cooperative Diversity Scheme
Distributed Spatial Modulation based Cooperative Diversity Scheme
 
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...
PERFORMANCE ANALYSIS OF BARKER CODE BASED ON THEIR CORRELATION PROPERTY IN MU...
 
MIMO System Performance Evaluation for High Data Rate Wireless Networks usin...
MIMO System Performance Evaluation for High Data Rate  Wireless Networks usin...MIMO System Performance Evaluation for High Data Rate  Wireless Networks usin...
MIMO System Performance Evaluation for High Data Rate Wireless Networks usin...
 
2512ijcsea02
2512ijcsea022512ijcsea02
2512ijcsea02
 
Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...Performance evaluation of different routing protocols in wsn using different ...
Performance evaluation of different routing protocols in wsn using different ...
 
A Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc NetworksA Survey of Using Directional Antennas in Ad Hoc Networks
A Survey of Using Directional Antennas in Ad Hoc Networks
 
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
COOPERATIVE COMMUNICATIONS COMBINATION DIVERSITY TECHNIQUES AND OPTIMAL POWER...
 
A Review of Relay selection based Cooperative Wireless Network for Capacity E...
A Review of Relay selection based Cooperative Wireless Network for Capacity E...A Review of Relay selection based Cooperative Wireless Network for Capacity E...
A Review of Relay selection based Cooperative Wireless Network for Capacity E...
 
CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...
CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...
CHANNEL ESTIMATION AND MULTIUSER DETECTION IN ASYNCHRONOUS SATELLITE COMMUNIC...
 
Performance of dsdv protocol based on different propagation model with vari
Performance of dsdv protocol based on different propagation model with variPerformance of dsdv protocol based on different propagation model with vari
Performance of dsdv protocol based on different propagation model with vari
 
Performance evaluation of diff routing protocols in wsn using difft network p...
Performance evaluation of diff routing protocols in wsn using difft network p...Performance evaluation of diff routing protocols in wsn using difft network p...
Performance evaluation of diff routing protocols in wsn using difft network p...
 
G010323739
G010323739G010323739
G010323739
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Paper id 252014136
Paper id 252014136Paper id 252014136
Paper id 252014136
 
A low complex modified golden
A low complex modified goldenA low complex modified golden
A low complex modified golden
 
Optimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor NetworksOptimum Sensor Node Localization in Wireless Sensor Networks
Optimum Sensor Node Localization in Wireless Sensor Networks
 
40520130101003
4052013010100340520130101003
40520130101003
 
Prediction of a reliable code for wireless communication systems
Prediction of a reliable code for wireless communication systemsPrediction of a reliable code for wireless communication systems
Prediction of a reliable code for wireless communication systems
 

Mais de Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

Mais de Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Último

Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 

Último (20)

Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 

11.design and implementation of distributed space frequency to achieve cooperative diversity in wireless relay networks

  • 1. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 1, No.1, 2011 Design and Implementation of Distributed Space-Frequency to Achieve Cooperative Diversity in Wireless Relay Networks K.S.Srikanth Dept of E.I.E, AITAM, Tekkali -532201, Andhra Pradesh, India. E-mail: srikanth.dsd@gmail.com Abstract Recently, there has been much interest in modulation techniques that can help in achieving transmit diversity motivated by the increased capacity of multiple-input multiple- output (MIMO) channel. To achieve transmit diversity the transmitter needs to be equipped with multiple antennas. The antennas should be well separated to have uncorrelated fading among the different antennas. This results in higher diversity orders and higher coding gains. However, achieving transmit diversity for mobile units requires cooperative diversity. In this context, the space-time codes (STC) for spread spectrum CDMA systems have received great interest in recent times. The schemes presented in this paper ensure that the limitations of conventional correlation receivers are overcome. The effect of the space-time code distribution on the space-time code that achieves full diversity with maximum coding gain over MIMO channels is studied in this paper. In most of the analogous works surveyed so far, it is observed, that, there has been very little focus on the study of systems that exhibit diversity of all the three forms namely: source coding diversity, channel coding diversity and user cooperation diversity. However, in this paper, all these three forms of diversity are uniformly considered and the proposed schemes are studied for their robustness and performance. It is shown, that, the proposed space-time coded communication scheme is both bandwidth and power efficient. To analyze the proposed scheme fully, communication over fading channels is considered. The maximum-likelihood decision metric is used to decode the original information in the presence of channel estimation errors. A study of the performance of the proposed STC system in the presence of slowly changing Rayleigh channels is also presented. Keywords: Multipath fading, Communication systems, Distributed Space-time codes, Wireless relay networks, Signal Processing, Multinode Cooperative communication, multiple sensor detection systems 1. Introduction Cooperative diversity can provide a new dimension over which higher diversity orders can be achieved. In this research work, the design of efficient schemes and protocols that can facilitate several terminals to cooperate via forwarding each other’s data is proposed. The proposed schemes can increase the system reliability by achieving spatial cooperative diversity. The focus of this research work is to identify and devise schemes that can help to tackle the problem of how to achieve and where to exploit diversity in cooperative networks. A spread-spectrum scheme typically consists of the following signal transmission and reception stages. 1. A pseudo-random code that is different for each channel and each successive connection. 2. The information data which modulates the pseudo-random code (i.e. the data is “spread”). 3. The resulting signal that modulates a carrier. 4. The modulated carrier is amplified and broadcast. 5. The carrier is received and amplified. 6. The received signal is mixed with a local carrier to recover the spread digital signal. Page | 1 www.iiste.org
  • 2. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 1, No.1, 2011 7. The receiver acquires the received code and phase locks its own code to it. 8. The received signal is correlated with the generated code, extracting the information data. The design of Distributed Space Time Code (DSTC) can mitigate the relay nodes synchronization errors. However, most of the previous works on cooperative transmission assume perfect synchronization between the relay nodes. This implies that the relays' timings, carrier frequencies, and propagation delays are identical. But, perfect synchronization is difficult to achieve among randomly located relay nodes. The process of acquiring the timing information of the transmitted spread spectrum signal is essential to the implementation of any form of spread spectrum technique. In figures 1 and 2, the importance of phase synchronization between the transmitted signal (assuming no noise case) and the locally generated carrier (PN code) is illustrated. The de-spreader output for case (i) equals the data input, whereas, for case (ii) the de-spreader output is another random sequence. This is due to the reason that, perfect phase synchronization is achieved only in case (i). Rapid growth in mobile computing and other wireless multimedia services is inspiring many research and development activities on high-speed wireless communication systems. Main challenges in this area include the development of efficient coding and modulation signal processing techniques to improve the quality and spectral efficiency of wireless systems. The recently emerged space-time coding and signal processing techniques for wireless communication systems employing multiple transmit and receive antennas offer a powerful paradigm for meeting these challenges. This chapter provides an overview on the recent use of space-time coding and signal processing techniques for multiple-input multiple-output (MIMO) communication systems. A review of the information theoretic results on the capacities of wireless systems employing multiple transmit and receive antennas is presented. Coding and signal processing techniques for wireless systems employing multiple transmit and receive antennas are also briefly touched upon. The proposed work considers the antenna array used by the space-time code to comprise of antennas of several geographically separated base stations (i.e. multiple antennas) and hence is more practical. In the first phase of this paper, the performance of an existing DS-CDMA scheme is studied in the presence of channel noise and interference. In the second phase, a block-coded Space-time coding scheme is designed and using a maximum likelihood decision metric at the receiver the decoding is achieved. Block space-time-codes are considered to reduce algorithmic complexity. A slow fading Rayleigh channel noise is considered in the simulation study. A major beneficiary of this paper could be in the field of wireless sensor networks. The concepts presented shall assist in using some of the relay nodes instead of some of the sensor nodes that are less-informative to the fusion center. These relay nodes can relay the information for the other more informative sensor nodes. Allowing some relay nodes to forward the measurements of the more-informative sensors will increase the reliability of these measurements at the expense of sending fewer measurements to the fusion center. This will create a tradeoff between the number of measurements sent to the fusion center and the reliability of the more-informative measurements. 2. Two Antenna System If two transmit antennas are spread out geographically, the Rayleigh fading becomes uncorrelated spatially because there is enough separation between the transmit antennas. Furthermore, it can be assumed that the fading is temporally quasi-static in the sense that, there is no correlation between two consecutive channel gains. Since the mobile station has different distances from each transmit antenna on the downlink, the mean received signal power at the mobile station is not the same for all paths. One can normalize the distance between the mobile station and the nearest base station to unity such that all the other distances are greater than unity. Consider the simple case where there are two base stations as shown in figure 3. The normalized distances are found using Page | 2 www.iiste.org
  • 3. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 1, No.1, 2011 d1 d 1, n= dr d2 d 2, n= dr where dr is the reference distance, which is the distance from the mobile station to the closest base station, and d1,n and d2,n are the normalized distances. Suppose d1 < d2 and thus dr = d1, so we can normalize d1,n to be 1 and d2,n is d2/dr. The received signal power is inversely proportional to the distance, so the mean SNR at each receiver becomes 1 = (ES / N0) (d1,n)-n 2 = ( ES/ N0) (d2,n)-n where n is the path loss exponent. For free space, n = 2, and for perfect ground reflection, n = 4. However, field tests have shown that the path loss exponent is in practice in the range 2  n  4. Thus, n=3 was chosen in this work during simulation. This can be extended to a typical edge-excited cellular system with 3 transmit antennas located on the edges of the cell. If the transmit antennas are placed in the same location, then the fading is highly correlated spatially, and the simulated system performance is not satisfactory even with block STC. 3. Two-Branch Transmit Diversity With One Receiver shows the base-band representation of the new two-branch transmit diversity scheme. The scheme uses two transmit antennas and one receive antenna and may be defined by the following three functions: The encoding and transmission sequence of information symbols at the transmitter; The combining scheme at the receiver; The decision rule for maximum likelihood detection. At a given symbol period, two signals are simultaneously transmitted from the two antennas. The signal transmitted from the antenna zero is denoted by s0 and from antenna one by s1. During the next symbol period signal (-s1*) is transmitted from antenna zero, and signal s0* is transmitted from antenna one where * is the complex conjugate operation. The encoding is done in space and time (space-time coding). The encoding, however, can also be done in space and frequency. Instead of two adjacent symbol periods, two adjacent carriers may be used (space-frequency coding). The channel at time t can be modeled by a complex multiplicative distortion h 0(t) for transmit antenna zero and h1(t) for transmit antenna one. Assuming that fading is constant across two consecutive symbols, the values of hi(t) can be written as, h0(t) = h0(t + T) = h0 = 0ej0 h1(t) = h1(t + T) = h1= 1ej1 where T is the symbol duration. The received signals can then be expressed as r0 = r(t) = h0s0 + h1s1 + n0 r1 = r(t+T) = *h0s1* + h1s0 + n1 where r0 and r1 are the received signals at time t and t + T and n0 and n1 are complex random variables representing receiver noise and interference. 4.The Combining Scheme The combiner shown in figure 4 builds the following two combined signals that are sent to the maximum likelihood detector: Page | 3 www.iiste.org
  • 4. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 1, No.1, 2011 It is important to note that this combining scheme is different from MRRC. the combiner output is expressed as 4.1 The Maximum Likelihood Decision Rule These combined signals are then sent to the maximum likelihood detector which, for each of the signals s0 and s1, uses the decision rule for BPSK signals. The combined signals are equivalent to that obtained from two-branch MRRC. The only difference is the presence of phase rotations on the noise components which do not degrade the effective SNR. Therefore, the resulting diversity order from the new two-branch transmit diversity scheme with one receiver is equal to that of two-branch MRRC. 5. The Proposed Algorithm Maximum likelihood decoding of any space-time block can be achieved using only linear processing at the receiver. The maximum likelihood decision amounts to minimizing the decision metric over all possible values of s1 and s2. Note that due to the quasi-static nature of the channel, the path gains are constant over two transmissions. The minimizing values are the receiver estimates of s1 and s2, respectively. When the above metric is expanded and the terms that are independent of the code words are deleted then the above minimization is equivalent to minimizing. The above metric decomposes into two parts, one of which is only a function of s2. Thus the minimization is equivalent to minimizing these two parts separately. This in turn is equivalent to minimizing the decision matrix Page | 4 www.iiste.org
  • 5. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 1, No.1, 2011 for detecting s1 and the decision metric for detecting s2. This is a simple decoding scheme and there is no performance sacrifice for achieving it. 6. DS-CDMA Implementation The proposed DS-CDMA scheme is shown in figure 5. The user data from the cell network is modulated using a pseudo-random code. In order to protect signal, the code used is pseudo-random. It appears random, but is actually deterministic, so that the receiver can reconstruct the code for synchronous detection. This pseudo-random code is called pseudo-noise (PN). The digital data is directly coded at a much higher frequency. The authenticated receiver knows how to generate the same code, and correlates the received signal with that code to extract the data. The Monte- Carlo simulation model used to study the performance of the proposed scheme is shown in figure 6. Different strengths of interference (represented as A in the plot) are considered and the probability of error is obtained for varying values of signal to noise ratio. The performance curves Monte-Carlo simulation model used for the simulation study of the proposed scheme are shown in figure 7. 7. Space-Time Codes For Cooperative Diversity Space-time coding of CDMA signals offer increased bandwidth and bit rate [10]. A linear block code is employed in this work. The generator matrix (for the block codes) chosen for the two user data is genmat1= [1 0 0 1 1 0;0 1 0 0 1 1;0 0 1 1 0 1] and genmat2= [1 0 0 0 1 1;0 1 0 1 0 1;0 0 1 1 1 0]. The results obtained by using the proposed algorithms are discussed in this section. Figure 8 to 12 show the transmitted two user data, received data with noise, the demodulated and de-spread data for the case of two transmit antenna and one receive antenna. Similarly figure 8 and 9 shows the probability of detection of error obtained versus signal to noise ratio for a two-sensor network over wireless fading channels. The performance curve i.e. Probability of error Vs SNR plot is shown in figure 13. The curve shows a significant improvement with very less Probability of error even at low SNRs . 8. Conclusion The primary objective of present day’s mobile technologies is to enhance the data rate on multi-path fading channels. A convincing solution introduced in this research work to achieve this is the use of multiple antennas in transmission. This thesis report new design schemes for transmitters and receivers of coded modulations over multiple antenna channels. The objective is to achieve near Shannon capacity performance over ergodic channels and near outage probability performance over block fading channels. Iterative joint detection and decoding are applied in the aim of achieving near maximum likelihood performance. Whenever the wireless channel does not experience a large amount of coupled delay and angle spread the algorithms proposed in this work can assist in producing a good improvement in performance with less complex topology. It has been shown in this thesis that coding across both spatial and temporal domains together achieves a diversity order equal to the product of the number of transmit and receive antennas. The proposed work is the development of architecture for secure communication in mobile wireless networks. The problem of deploying relay nodes in sensor networks is well considered in this work. A system consisting of a set of sensor nodes communicating Page | 5 www.iiste.org
  • 6. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 1, No.1, 2011 to a fusion center, where decisions are made, is considered. As some sensor nodes provide "less-informative" measurements to the fusion center, effective means of assigning the system resources allocated for these sensors to relay nodes to forward the measurements of the other "more-informative" sensor nodes is considered in this thesis. This introduces a new tradeoff in the system design between the number of measurements sent to the fusion center and the reliability of the more-informative measurements, which is enhanced by deploying more relay nodes in the network. The approach divides the network into clusters and implements a decentralized certification authority. Decentralization is achieved using threshold cryptography and a network secret that is distributed over a number of nodes. While this basic idea has been proposed earlier partially, its application on clustered network is a novelty of the work. The work address issues of authorization, access control and a multilevel security model and helps to adapt to the complexity of mobile end systems. It also effectively counteracts the denial of service (DoS) threats and hence, can prolong the life time and improve robustness of wireless sensor network. To check the validity of algorithms proposed in this thesis, different test inputs are given and the results are analyzed. The algorithm was validated with uniform distribution of nodes and also random distributions like Gaussian, Poisson, Rayleigh and Exponential. Studies related to energy spent in transmission and reception to discover the given topology using the proposed algorithm is done along with throughput fluctuations. Results obtained show that the schemes proposed in this work, result in significant dependability improvement for a wireless sensor network. The proposed work shall enable a wireless sensor network to consume extremely low power, operate in high volumetric densities and be dispensable. It is ideally suited to most of the applications that share similar features such as difficult to access because of geographical location where the network has been deployed, the large scale of deployment, high mobility and prone to failure. It also ensures that the wireless sensor network be autonomous and operate unattended, be adaptive to the environment and choose an optimal number of communicating sensing nodes since too many sensors can generate bottlenecks in the communication infrastructure when they all compete for bandwidth. References H.V. Poor, "Signal Processing for Wideband Communications," IEEE Information Society News-letter, June 1992. C.K.Weber et al., " Performance Considerations of CDMA Systems," IEEE Trans. on Vehicular Technology, Feb. 1981, pp3-9. E. Telatar, Capacity of multi-antenna Gaussian channels," European Transactions on Telecommunications, vol. 10, no. 6, pp. 585{595, Nov./Dec. 1999. G. J. Foschini and M. Gans, On the limits of wireless communication in a fading environment when using multiple antennas," Wireless Personal Communication, vol. 6, pp. 311{335, Mar. 1998. A.Naquib et al, IEEE Transactions on Communication systems, 1998 William et al, IEEE Transactions on Systems, Man and Cybernetics, 1991. J. Foschini et al, IEEE Transactions on Communication systems and Engineering, 2003. V.Tarokh et al, IEEE Transactions on Communication systems, 1998. W. Su, A. K. Sadek, and K. J. R. Liu, Cooperative communications in wireless networks: Performance analysis and optimum power allocation," Wireless Personal Communications, vol. 44, no. 2, pp. 181{217, Jan. 2008. A. K. Sadek, W. Su, and K. J. R. Liu, Multi-node cooperative communications in wireless networks," IEEE Trans. Signal Processing, vol. 55, pp.341-355, Jan 2007. Page | 6 www.iiste.org
  • 7. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 1, No.1, 2011 Data Data PN carrier PN carrier Spreader output Spreader output Local PN carrier Local PN carrier De-spreader output T De-spreader output Fig 1 : Phase synchronization is perfect Fig 2 : Phase error due to one bit offset s s* tx - * s tx s 0 1 antenna 0 s 0 0 antenna 1 1 h0 = h1 = h0 = h1 = 0ej0 1ej1 0e j 1ej rx 0 1 antenna 1 n interferen n 0 ce & 1 n n h noise combi interf interf chann h 0 ~ ner ~ r0 0 = erenc erenc r1 1= h el h 1 s s s0h0 + e& e & s0h1 + 0 estima 1 Maximum likelihood detector 0 1 cha cha noise h noise tor n0 nne h * ~ s h * h nne n1 0 0 1 1 l 0 Maximu l esti m esti ma likelihood ma Fig 3 The new two-branch transmit Two-branch MRRCV The Proposed Algorithm tor tor detector diversity scheme with one receiver Page | 7 www.iiste.org
  • 8. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 1, No.1, 2011 NOKIA USER 1 MODULATOR CELL 1 WIRELESS TX: PN seq 433.2 MHZ INTERLEAVER MODULATOR NOKIA CARRIER USER 2 MODULATOR CELL 2 PN 2 SECURE CDMA TX: DEMOD USER 1 ANTENNNA PN I WIRELESS DEINTERLEAVER RX: PN 2 DEMOD USER 2 SECURE CDMA RX: Fig 5 : Proposed real-time implementation of the CDMA Tx: and Rx Fig 6 : Monte-Carlo simulation model used for the simulation study of the proposed scheme 0.5 0.45 A = 12 0.4 0.35 0.3 A=7 A= 3 P (e) 0.25 0.2 0.15 A= 0 0.1 0.05 0 0 1 2 3 4 5 6 7 8 9 10 11 12 SNR (in dB) Fig7 : Performance graph for the Proposed CDMA OBSERVATION PLOTS Page | 8 www.iiste.org
  • 9. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 1, No.1, 2011 Fig 8 BPSK modulated data of user 1 generated by antenna 1 Fig 9 BPSK modulated data of user 2 generated by antenna 2 Fig 10 Space-time coded received signal with noise (obtained with 2 transmit and 1 receive antenna) Page | 9 www.iiste.org
  • 10. Network and Complex Systems www.iiste.org ISSN 2224-610X (Paper) ISSN 2225-0603 (Online) Vol 1, No.1, 2011 Fig 11 Demodulated data 1 Fig 12 demodulated data2 Fig 13. Performance graph for the proposed Scheme Page | 10 www.iiste.org
  • 11. International Journals Call for Paper The IISTE, a U.S. publisher, is currently hosting the academic journals listed below. The peer review process of the following journals usually takes LESS THAN 14 business days and IISTE usually publishes a qualified article within 30 days. Authors should send their full paper to the following email address. More information can be found in the IISTE website : www.iiste.org Business, Economics, Finance and Management PAPER SUBMISSION EMAIL European Journal of Business and Management EJBM@iiste.org Research Journal of Finance and Accounting RJFA@iiste.org Journal of Economics and Sustainable Development JESD@iiste.org Information and Knowledge Management IKM@iiste.org Developing Country Studies DCS@iiste.org Industrial Engineering Letters IEL@iiste.org Physical Sciences, Mathematics and Chemistry PAPER SUBMISSION EMAIL Journal of Natural Sciences Research JNSR@iiste.org Chemistry and Materials Research CMR@iiste.org Mathematical Theory and Modeling MTM@iiste.org Advances in Physics Theories and Applications APTA@iiste.org Chemical and Process Engineering Research CPER@iiste.org Engineering, Technology and Systems PAPER SUBMISSION EMAIL Computer Engineering and Intelligent Systems CEIS@iiste.org Innovative Systems Design and Engineering ISDE@iiste.org Journal of Energy Technologies and Policy JETP@iiste.org Information and Knowledge Management IKM@iiste.org Control Theory and Informatics CTI@iiste.org Journal of Information Engineering and Applications JIEA@iiste.org Industrial Engineering Letters IEL@iiste.org Network and Complex Systems NCS@iiste.org Environment, Civil, Materials Sciences PAPER SUBMISSION EMAIL Journal of Environment and Earth Science JEES@iiste.org Civil and Environmental Research CER@iiste.org Journal of Natural Sciences Research JNSR@iiste.org Civil and Environmental Research CER@iiste.org Life Science, Food and Medical Sciences PAPER SUBMISSION EMAIL Journal of Natural Sciences Research JNSR@iiste.org Journal of Biology, Agriculture and Healthcare JBAH@iiste.org Food Science and Quality Management FSQM@iiste.org Chemistry and Materials Research CMR@iiste.org Education, and other Social Sciences PAPER SUBMISSION EMAIL Journal of Education and Practice JEP@iiste.org Journal of Law, Policy and Globalization JLPG@iiste.org Global knowledge sharing: New Media and Mass Communication NMMC@iiste.org EBSCO, Index Copernicus, Ulrich's Journal of Energy Technologies and Policy JETP@iiste.org Periodicals Directory, JournalTOCS, PKP Historical Research Letter HRL@iiste.org Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Public Policy and Administration Research PPAR@iiste.org Zeitschriftenbibliothek EZB, Open J-Gate, International Affairs and Global Strategy IAGS@iiste.org OCLC WorldCat, Universe Digtial Library , Research on Humanities and Social Sciences RHSS@iiste.org NewJour, Google Scholar. Developing Country Studies DCS@iiste.org IISTE is member of CrossRef. All journals Arts and Design Studies ADS@iiste.org have high IC Impact Factor Values (ICV).