SlideShare uma empresa Scribd logo
1 de 5
Baixar para ler offline
ACEEE Int. J. on Communication, Vol. 02, No. 02, July 2011



  Coding and ANN - assisted Pseudo - Noise Sequence
  Generator for DS / FH Spread Spectrum Modulation
                 for Wireless Channels
                                          Juthika Gogoi and Kandarpa Kumar Sarma
                Department of Electronics and Communication Engineering, Tezpur University, Tezpur, India
                                              Email: juthikagogoi@gmail.com
               Department of Electronics Communication and Technology, Gauhati University, Guwahati, India
                                              Email: kandarpaks@gmail.com

Abstract—One of the challenging issues in Spread-Spectrum
Modulation (SSM) is the design of the Pseudo - Random or
Pseudo - Noise (PN) sequence generator as an option to the
already available methods. This work is related to the use of
Artificial Neural Network (ANN) for generation of the PN
sequence during transmission and reception of a SSM based
system. The benefit of the ANN - assisted PN generator shall
be that it will simplify the design process of the PN - generator
and yet provide high reliability against disruptions due to
intentional disruptions and degradation of signal quality
resulting out of variations in channel condition. The                            Figure 1 : Direct sequence spread spectrum system
performance of the SSM system can be further enhanced by
the use of coding. Hamming and cyclic redundancy check
(CRC) codes have been used here with the data stream to
explore if performance of the SSM system is improved further.

Index Terms—SSM, PN sequence, ANN, Rayleigh, Rician

                        I. INTRODUCTION
    Spread Spectrum Modulation (SSM) is a transmission
technique in which a Pseudo-Noise (PN) code independent
of the information data is used as a modulation waveform to
spread the signal energy over a bandwidth much greater than
                                                                                     Figure 2 : FHSS transmitter and receiver
the signal information bandwidth. This technique decreases
the potential interference to other receivers while achieving
                                                                                             II. SYSTEM MODEL
privacy [1]. For the SSM system performance, the processing
gain of the spreading code is one of the major concerns. The                 The system model is depicted in Fig. 3. It is constituted
processing gain depends on the code length of the spreading              by a SSM transmitter with a PN sequence generator formed
code. The larger the processing gain, the better is the system           by an ANN. The receiver is also assisted by an ANN. The
performance [2]. This is dependent on the PN sequence to be              ANN is trained to generate the unique PN sequences which
used for the SSM. There are several approaches to how a PN               are used for transmission and reception of specific data
sequence can be generated, but this work considers a PN                  blocks. The core of the system is the ANN. The most important
sequence generator assisted by Artificial Neural Network                 difference with respect to classical information processing
(ANN) for transmission and reception. A direct sequence                  techniques is that ANNs are not mathematically programmed,
(DS) spread spectrum signal is generated by the direct mixing            but are trained with examples [7]. The system model related
of the incoming data with a spreading waveform before the                to this work is depicted in Fig. 3 and has the components as
final carrier modulation. But in frequency hopping (FH) the              described below.
spectrum of a data-modulated carrier is widened by changing
                                                                         A. ANN Formation
the carrier frequency in a pseudo-random manner over a
sequence of frequencies called the frequency hopping pattern                  A feed-forward ANN is created with parameters as in Table
[3][4][5][6]. A generic SSM setup with both DS and FH                    I. It is known as Multi-Layer Perceptron (MLP) (Fig. 4). The
approaches is depicted in the Figs. 1 and 2.                             equation for output in a MLP with one hidden layer is given
                                                                         as [8]:




                                                                    26
© 2011 ACEEE
DOI: 01.IJCOM.02.02.180
ACEEE Int. J. on Communication, Vol. 02, No. 02, July 2011




                      Figure 3 : System Model
                                                                                              FIGURE 4 : MULTI-LAYER PERCEPTRON

                                                                                              TABLE I : NETWORK PARAMETERS
                                                                (1)

where βi is the bias value and wi weight value between the ith
hidden neuron. The process of adjusting the weights and
biases of the MLP is known as training. Training the MLP is
done in two broad passes - one a forward pass and the other
a backward calculation with error determination and
connecting weight updating in between. The output from
the hidden layer is obtained depending upon the choice of
the activation function. The values of the hidden nodes are :
                                  L
                    h                        h
              net   mj          w          ji   p mi   jh   (2)         where η is the learning rate. One cycle through the complete
                                 i 1
                                                                            training set forms one epochs. The above is repeated till
The values of the of output node can be obtained as :
                                                                            MSE meets the performance criteria.This cycle constitutes
                      o
               o mk  f ko net mj
                               h
                                                               (3)        the learning phase of the MLP [8].
Forward Computation: The errors can be computed as :                        B. Training and Testing
                 e jn  d jn  o jn                              (4)            ANNs can generalize and correctly classify inputs
 The mean square error (MSE) is calculated as :                             unknown to them previously. A training set is used to help
                                                                            the ANN learn which is reflected by a continuous update of
                          M             L                                   network weights and biases, and after training, each network
                                            e2    jn                      go through a testing procedure to gather data for evaluation
         MSE      
                          j 1        n 1                      (5)         of its usefulness. One set of data is created for training the
                                   2M                                       ANN. The data set consists of DPSK modulated signals along
Error terms for the output layer are :                                      with ANN-assisted PN sequence. The DPSK modulated signal
                                                                            has a signal-to-noise (SNR) variation between -10 to 30 dB
                                                                            which makes 41 sets with signal variations. Further there are
Error terms for the hidden layer :
                                                                            variations like Gaussian and fading (Rayleigh and Rician)
                                                                            channels. This way a total of 123 signalling conditions are
                                                                            obtained. Of each signalling condition atleast 10 sets are
Weight Update : Between the output and hidden layers                        taken as samples to make the training robust. Similarly a testing
                                                                            set is created to validate the training. This set of data consists
                                                                            of data bits whose length is equal to the PN sequence and is
                                                                            presented to each ANN. Network specific




                                                                       27
© 2011 ACEEE
DOI: 01.IJCOM.02.02.180
ACEEE Int. J. on Communication, Vol. 02, No. 02, July 2011

 TABLE II : PARAMETERS OF THE PN SEQUENCE FOR THE DSSSM SYSTEM          TABLE III : PARAMETERS OF T HE PN SEQUENCE FOR THE FHSSM
                                                                                                 SYSTEM




procedures are then used to compare the output of each ANN
against the desired outputs. The training time is a parameter         E. System design
that is independent of the test data and is the number of                 With reference to Fig. 3 the PN sequence used in the
seconds spent training a particular network.                          analysis of the DSSSM system has the parameters as shown
                                                                      in Table II. In both DS and FH systems a 32 bit binary stream
C. Evaluation                                                         is taken as the message signal. The data in this signal can
    Running an ANN simulation produces a matrix of actual             take two amplitudes, where one amplitude corresponds to
network outputs. These values can be compared to a target             logical 1 and the other amplitude to logical 0. This data stream
matrix of desired ANN outputs to evaluate the performance             is multiplied with a cosine function of a higher frequency. In
of each network. The input layer consists of a few number of          fact, this modulation can be considered as the primary
nodes equal to the length of the PN sequence. The output              modulation. Mathematically,
layer has a size equal to the number of bits to be included in                                                      (9)
the ANN generated PN sequence. The performance function               such that the pre-modulated signal m(t) is given as
is the least mean of squared error (LMSE) which minimizes
the average of the squared network errors. Once all the inputs                                                          (10)
have been presented, the training algorithm modifies the              where f = f1 and f = f2 are the two frequencies for s(t) = 1 and
weights according to its procedure. The total number of               s(t) = -1 respectively taken such that these frequencies lie
epochs for each ANN is around 5000. The training of the               within the spread spectrum bandwidth.
ANN is carried out using four different training methods.             For simplicity, it has been assumed that all amplitudes are
These are                                                             equal to one. After the primary modulation, the signal is
      Backpropagation with gradient descent (BPGD).                  modulated again, to spread its frequency spectrum. This
      Backpropagation with gradient descent and                      modulation is the multiplication of the signal m(t) with a digital
          momentum (BPGDM).                                           signal of larger frequency range. The transmitted spread
      Backpropagation with gradient descent and adaptive             spectrum signal is given by
          learning rate (BPGDA).                                                                                     (11)
      Backpropagation with gradient descent, momentum
          and adaptive learning rate (BPGDX).                         where c(t) is the PN sequence.
Out of these four training methods, BPGD turns out to be              At the transmitter, binary symbols are transmitted with energy
most efficient in terms of training time, accuracy and number         E per symbol. The noise n(t) added to this transmitted signal
of epochs required to reach the desired goal.                         has an effect only on the amplitude. It depends on the signal-
                                                                      to-noise ratio (SNR). Hence the signal transmitted through
D. Hamming and CRC coding                                             the channel can be represented by the following equation
     Hamming code is a linear error-correcting code which can                                                        (12)
detect up to two simultaneous bit errors, and correct single-
bit errors. Thus reliable communication is possible when the          To recreate data at the receiver, the signal is despreaded first
Hamming distance between the transmitted and received bit             and then normally demodulated. The despreading can only
patterns is less than or equal to one. By contrast, the simple        be successful if the code sequence generated in the receiver
parity code cannot correct errors, and can only detect an odd         is exactly synchronised with that of the received signal. The
number of errors [9]. A cyclic redundancy check (CRC) is an           parameters of the PN sequence used for the analysis of the
error-detecting code designed to detect accidental changes            FHSSM system are given in Table III. With each of the signal
to raw data, based on the theory of cyclic error-correcting           sets considered, a unique PN sequence is generated by the
codes. CRCs are so called because the check (data                     ANN. There is a one-to-one correspondence between the
verification) code is a redundancy (it adds zero information          signal to be transmitted and the PN sequence generated.
to the message) and the algorithm is based on cyclic codes            This correspondence is used at the receiver for recovery of
[9].                                                                  the data. The ANN for a given input of received signal
                                                                      provides the unique PN code. The precision of the PN code
                                                                      can be varied with better ANN configuration and training.



                                                                 28
© 2011 ACEEE
DOI: 01.IJCOM.02.02.180
ACEEE Int. J. on Communication, Vol. 02, No. 02, July 2011

  TABLE IV : B ER FOR DIFFERENT VALUES O F T HE JAMMING FACTOR OF            TABLE VII : B ER FOR DIFFERENT VALUES O F T HE JAMMING FACTOR OF
                           DSSSM SYSTEM                                     DSSSM SYSTEM SYMBOLFOR HAMMING AND CRC CODE INFORMATION SEQUENCE




  TABLE V : BER FOR D IFFERENT HOPS O F T HE PN SEQUENCE OF FHSSM
                               SYSTEM



                                                                            TABLE VIII : BER FOR D IFFERENT HOPS O F T HE PN SEQUENCE OF FHSSM
                                                                               SYSTEM SYMBOLFOR HAMMING AND CRC CODE INFORMATION SEQUENCE




TABLE VI : BER FOR DIFFERENT VALUES O F T HE JAMMING FACTOR OF FHSSM
                      SYSTEM AT 2 HOPS/SYMBOL




                                                                                               III. RESULTS AND DISCUSSION
                                                                                Based on the data generated by simulation of DSSSM
                                                                            and FHSSM systems, relationship using DPSK modulation
                                                                            technique between BER as a function of the jamming factor
                                                                            and number of hops is obtained using the PN sequence Tables
                                                                            IV – VI. Table IV shows that with the increase in the jamming
                                                                            factor from 0.1 to 1.0, the BER decreases from 0.0366 to 0.0216
The entire system is trained and tested in a setup closely                  for the PN sequence generated using shift registers while the
related to an environment where the SSM operates. The                       BER decreases from 0.0307 to 0.0186 for the PN sequence
performance of the spread spectrum system in presence of                    generated using ANNs. Table V shows that in case of the
partial band noise jammer is analysed for different fractions               FHSSM system using the PN sequence generated using shift
of the spread spectrum bandwidth. A jammer is considered                    registers, as the number of hops is increased from 2 hops/
that transmits noise over a fraction of the total spread                    symbol to 10 hops/symbol, the BER is 0.0295 and 0.0250
spectrum bandwidth. The jammer signal is a Gaussian noise                   respectively and 0.0286 and 0.0249 respectively for the PN
with a flat power spectral density over the jammed bandwidth.               sequence generated using ANNs. Table VI shows that in
The jammer spreads noise of the total power J over some                     case of the FHSSM system, keeping the hop rate at 2 hops/
frequency range of bandwidth Wj, which is a subset of the                   symbol, as the jamming factor is increased from 0.1 to 1.0,
total spread spectrum bandwidth Wss. It is assumed that the                 BER of 0.0295 and 0.0233 respectively is generated using the
shifts in the jammed band coincide with carrier hop transitions.            PN sequence generated using shift registers while the BER is
It is experimentally found that when the fraction of the                    0.0286 and 0.0223 in case of the PN sequence generated using
jamming bandwidth is decreased, the probability of the system               ANNs. Based on the data generated by simulation of the
being jammed is decreased but the jammed signals suffer a                   DSSSM and FHSSM systems, relationship using DPSK
higher error rate, resulting in a degradation in the performance            modulation technique between BER as a function of the
of the system and vice-versa. The error rate is also calculated             jamming factor and number of hops is obtained in Tables
by varying the number of hops per data symbol.                              VII–IX for both Hamming and CRC coded information
                                                                       29
© 2011 ACEEE
DOI: 01.IJCOM.02.02.180
ACEEE Int. J. on Communication, Vol. 02, No. 02, July 2011


sequence. Table VII shows that with the increase in the                TABLE IX : BER FOR DIFFERENT VALUES O F T HE JAMMING FACTOR OF FHSSM
                                                                          SYSTEM AT 2 HOPS/SYMBOLFOR HAMMING AND CRC CODE INFORMATION
jamming factor from 0.1 to 1.0, the BER goes down from 0.0265
                                                                                                     SEQUENCE
to 0.0169 for the PN sequence generated using shift registers.
The corresponding BER is 0.0240 at jamming factor 0.1 and
0.0156 at jamming factor of 1for the PN sequence generated
using ANNs for the Hamming coded sequence. The BER is
0.0299 at jamming factor 0.1 and 0.0183 at jamming factor of 1
for the PN sequence generated using shift registers. For the
CRC coded sequence the BER is 1x10-4 at jamming factor 0.1
and 1x10-4 at jamming factor of 1 for the PN sequence generated
using ANNs. Table VIII shows that in case of the FHSSM
system using the PN sequence generated using shift registers,
as the number of hops is increased from 2 hops/symbol to 10
hops/symbol, the BER is 0.0251 and 0.0246 respectively and
0.0242 and 0.0240 respectively for the PN sequence generated
using ANNs for both the Hamming coded sequence and the
CRC coded sequence. Table IX shows that in case of the
FHSSM system, keeping the hop rate at 2 hops/symbol, as
the jamming factor is increased from 0.1 to 1.0, BER of 0.0265
and 0.0169 respectively is generated using the PN sequence
generated using shift registers while the BER is 0.0240 and
0.0156 in case of the PN sequence generated using ANNs for                                        REFERENCES
the Hamming coded sequence while the BER is 0.0299 and
0.0183 for the PN sequence generated using shift registers             [1] G. Ponuratinam, B. Patel and S. S. R. K. M. Elleithy,
and 1x10-4 in case of the PN sequence generated using ANNs             “Improvement in the Spread Spectrum System in DSSS, FHSS,
                                                                       and CDMA,” Computer Science and Engineering Department,
for the CRC coded sequence. From the above tables it is
                                                                       University of Bridgeport, Bridgeport, CT 06605.
seen that when the information sequence is coded using                 [2] M. L. Wu, K. A. Wen and C. W. Huang, “Efficient
Hamming and CRC coding the BER has reduced though the                  Pseudonoise Code Design for Spread Spectrum Wireless
use of coding bits leads to some waste in bandwidth. The               Communication Systems”. IEEE Transactions on Circuits and
BER with CRC coding has fallen to 4x10-4 and 10-4 in Rayleigh          systems II: Analog and Digital Signal Processing, Vol. 48, No. 6,
fading channels without ANN and Rayleigh fading channel                June 2001.
with ANN respectively over the SNR range -10dB to 30 dB. It            [3] S. Haykin, “Digital Communications,” John Wiley and Sons
represents 13% and 14% improvement compared to uncoded                 Inc, United Kingdom, 2010.
forms. Thus the use of ANN-assisted PN sequence                        [4] S. Zoican,”Frequency Hopping Spread Spectrum Technique
                                                                       for Wireless Communication Systems,” IEEE Transactions on
generation and coding is justified for application in DS/FH
                                                                       Communications, 1998.
SSM in wireless channels.                                              [5] T. S. D. Tsui and T. G. Clarkson, “Spread Spectrum
                                                                       Communication Techniques,” Electronics and Communication
                       IV. CONCLUSION                                  Engineering Journal, pp 3-6, February 1994.
                                                                       [6] G. J. R. Povey and P. M. Grant, “Simplified matched filter
    The work shows the effectiveness of the use of ANN for
                                                                       receiver designs for spread spectrum communications applications,”
PN sequence generator and coding for both DS and FH SSM                Electronics and Communication Engineering journal, April 1993.
systems. The extracted results show that the ANN assisted              [7] P. de Bruyne, 0. Kjelsen and 0. Sacroug, “Spread Spectrum
PN sequence generator helps in providing superior BER                  Digital Signal Synchronization using Neural Networks,” IEEE
values in both Gaussian and Multipath faded channels. The              Transactions on Communications, 1992.
work also demonstrates that performance improves further               [8] S. Haykin: Neural Networks: A Comprehensive Foundation
with the use of coding. The combination proves to be                   (2nd Edition), Pearson Education, New Delhi, 1998.
effective in wireless channels. The ANN assisted PN                    [9] W. E. Ryan and S. Lin, Channel Codes: Classical and Modern,
sequence is robust enough to prevent false triggering which            Cambridge University Press, New York, 2009.
also helps it to provide better performance in wireless
channels. Thus, the system proposed can prove to be
effective and enhance performance of DS/FH SSM
transmission.




                                                                  30
© 2011 ACEEE
DOI: 01.IJCOM.02.02.180

Mais conteúdo relacionado

Mais procurados

A COMPREHENSIVE STUDY AND PERFORMANCE COMPARISON OF M-ARY MODULATION SCHEMES ...
A COMPREHENSIVE STUDY AND PERFORMANCE COMPARISON OF M-ARY MODULATION SCHEMES ...A COMPREHENSIVE STUDY AND PERFORMANCE COMPARISON OF M-ARY MODULATION SCHEMES ...
A COMPREHENSIVE STUDY AND PERFORMANCE COMPARISON OF M-ARY MODULATION SCHEMES ...IJCSEA Journal
 
ANN based STLF of Power System
ANN based STLF of Power SystemANN based STLF of Power System
ANN based STLF of Power SystemYousuf Khan
 
Speaker and Speech Recognition for Secured Smart Home Applications
Speaker and Speech Recognition for Secured Smart Home ApplicationsSpeaker and Speech Recognition for Secured Smart Home Applications
Speaker and Speech Recognition for Secured Smart Home ApplicationsRoger Gomes
 
A CoMP Simulation Model Based on UE-Centric Soft Handover Grouping Algorithm
A CoMP Simulation Model Based on UE-Centric Soft Handover Grouping AlgorithmA CoMP Simulation Model Based on UE-Centric Soft Handover Grouping Algorithm
A CoMP Simulation Model Based on UE-Centric Soft Handover Grouping AlgorithmChen Li
 
Analog VLSI Implementation of Neural Network Architecture for Signal Processing
Analog VLSI Implementation of Neural Network Architecture for Signal ProcessingAnalog VLSI Implementation of Neural Network Architecture for Signal Processing
Analog VLSI Implementation of Neural Network Architecture for Signal ProcessingVLSICS Design
 
Neural network based energy efficient clustering and routing
Neural network based energy efficient clustering and routingNeural network based energy efficient clustering and routing
Neural network based energy efficient clustering and routingambitlick
 
M.Tech: WIRELESS AND MOBILE NETWORK Assignment II
M.Tech: WIRELESS AND MOBILE NETWORK Assignment IIM.Tech: WIRELESS AND MOBILE NETWORK Assignment II
M.Tech: WIRELESS AND MOBILE NETWORK Assignment IIVijayananda Mohire
 
A survey based on eeg classification
A survey based on eeg classificationA survey based on eeg classification
A survey based on eeg classificationijitjournal
 
M.Tech: WIRELESS AND MOBILE NETWORK Assignment I
M.Tech: WIRELESS AND MOBILE NETWORK Assignment IM.Tech: WIRELESS AND MOBILE NETWORK Assignment I
M.Tech: WIRELESS AND MOBILE NETWORK Assignment IVijayananda Mohire
 
Paper id 252014146
Paper id 252014146Paper id 252014146
Paper id 252014146IJRAT
 
Energy Performance of LDPC Scheme in Multi-Hop Wireless Sensor Network with T...
Energy Performance of LDPC Scheme in Multi-Hop Wireless Sensor Network with T...Energy Performance of LDPC Scheme in Multi-Hop Wireless Sensor Network with T...
Energy Performance of LDPC Scheme in Multi-Hop Wireless Sensor Network with T...IJECEIAES
 
Comparison Between Levenberg-Marquardt And Scaled Conjugate Gradient Training...
Comparison Between Levenberg-Marquardt And Scaled Conjugate Gradient Training...Comparison Between Levenberg-Marquardt And Scaled Conjugate Gradient Training...
Comparison Between Levenberg-Marquardt And Scaled Conjugate Gradient Training...CSCJournals
 
Evaluation of the Medical Image Compression using Wavelet Packet Transform an...
Evaluation of the Medical Image Compression using Wavelet Packet Transform an...Evaluation of the Medical Image Compression using Wavelet Packet Transform an...
Evaluation of the Medical Image Compression using Wavelet Packet Transform an...IJECEIAES
 

Mais procurados (18)

A COMPREHENSIVE STUDY AND PERFORMANCE COMPARISON OF M-ARY MODULATION SCHEMES ...
A COMPREHENSIVE STUDY AND PERFORMANCE COMPARISON OF M-ARY MODULATION SCHEMES ...A COMPREHENSIVE STUDY AND PERFORMANCE COMPARISON OF M-ARY MODULATION SCHEMES ...
A COMPREHENSIVE STUDY AND PERFORMANCE COMPARISON OF M-ARY MODULATION SCHEMES ...
 
6119ijcsitce01
6119ijcsitce016119ijcsitce01
6119ijcsitce01
 
ANN based STLF of Power System
ANN based STLF of Power SystemANN based STLF of Power System
ANN based STLF of Power System
 
Speaker and Speech Recognition for Secured Smart Home Applications
Speaker and Speech Recognition for Secured Smart Home ApplicationsSpeaker and Speech Recognition for Secured Smart Home Applications
Speaker and Speech Recognition for Secured Smart Home Applications
 
Ge3611231125
Ge3611231125Ge3611231125
Ge3611231125
 
A CoMP Simulation Model Based on UE-Centric Soft Handover Grouping Algorithm
A CoMP Simulation Model Based on UE-Centric Soft Handover Grouping AlgorithmA CoMP Simulation Model Based on UE-Centric Soft Handover Grouping Algorithm
A CoMP Simulation Model Based on UE-Centric Soft Handover Grouping Algorithm
 
Analog VLSI Implementation of Neural Network Architecture for Signal Processing
Analog VLSI Implementation of Neural Network Architecture for Signal ProcessingAnalog VLSI Implementation of Neural Network Architecture for Signal Processing
Analog VLSI Implementation of Neural Network Architecture for Signal Processing
 
Neural network based energy efficient clustering and routing
Neural network based energy efficient clustering and routingNeural network based energy efficient clustering and routing
Neural network based energy efficient clustering and routing
 
M.Tech: WIRELESS AND MOBILE NETWORK Assignment II
M.Tech: WIRELESS AND MOBILE NETWORK Assignment IIM.Tech: WIRELESS AND MOBILE NETWORK Assignment II
M.Tech: WIRELESS AND MOBILE NETWORK Assignment II
 
A survey based on eeg classification
A survey based on eeg classificationA survey based on eeg classification
A survey based on eeg classification
 
M.Tech: WIRELESS AND MOBILE NETWORK Assignment I
M.Tech: WIRELESS AND MOBILE NETWORK Assignment IM.Tech: WIRELESS AND MOBILE NETWORK Assignment I
M.Tech: WIRELESS AND MOBILE NETWORK Assignment I
 
Paper id 252014146
Paper id 252014146Paper id 252014146
Paper id 252014146
 
Energy Performance of LDPC Scheme in Multi-Hop Wireless Sensor Network with T...
Energy Performance of LDPC Scheme in Multi-Hop Wireless Sensor Network with T...Energy Performance of LDPC Scheme in Multi-Hop Wireless Sensor Network with T...
Energy Performance of LDPC Scheme in Multi-Hop Wireless Sensor Network with T...
 
Slides
SlidesSlides
Slides
 
Me2521122119
Me2521122119Me2521122119
Me2521122119
 
H0261047055
H0261047055H0261047055
H0261047055
 
Comparison Between Levenberg-Marquardt And Scaled Conjugate Gradient Training...
Comparison Between Levenberg-Marquardt And Scaled Conjugate Gradient Training...Comparison Between Levenberg-Marquardt And Scaled Conjugate Gradient Training...
Comparison Between Levenberg-Marquardt And Scaled Conjugate Gradient Training...
 
Evaluation of the Medical Image Compression using Wavelet Packet Transform an...
Evaluation of the Medical Image Compression using Wavelet Packet Transform an...Evaluation of the Medical Image Compression using Wavelet Packet Transform an...
Evaluation of the Medical Image Compression using Wavelet Packet Transform an...
 

Destaque

A switched reluctance generator with interleaved interface dc–dc converter
A switched reluctance generator with interleaved interface dc–dc converterA switched reluctance generator with interleaved interface dc–dc converter
A switched reluctance generator with interleaved interface dc–dc converterI3E Technologies
 
Programmable PN Sequence Generators
Programmable PN Sequence GeneratorsProgrammable PN Sequence Generators
Programmable PN Sequence GeneratorsRajesh Singh
 
EFFICIENT FPGA IMPLEMENTATION OF ADDRESS GENERATOR FOR WIMAX DEINTERLEAVER
EFFICIENT FPGA IMPLEMENTATION OF ADDRESS GENERATOR FOR WIMAX DEINTERLEAVEREFFICIENT FPGA IMPLEMENTATION OF ADDRESS GENERATOR FOR WIMAX DEINTERLEAVER
EFFICIENT FPGA IMPLEMENTATION OF ADDRESS GENERATOR FOR WIMAX DEINTERLEAVER11nc1a0413
 
Spread-Spectrum Techniques
Spread-Spectrum TechniquesSpread-Spectrum Techniques
Spread-Spectrum Techniquesmohammedalimahdi
 
Pseudo Random Bit Sequence Generator
Pseudo Random Bit Sequence Generator Pseudo Random Bit Sequence Generator
Pseudo Random Bit Sequence Generator ajay singh
 
Bit interleaved coded modulation
Bit interleaved coded modulationBit interleaved coded modulation
Bit interleaved coded modulationMridula Sharma
 
Simulation of Wireless Communication Systems
Simulation of Wireless Communication SystemsSimulation of Wireless Communication Systems
Simulation of Wireless Communication SystemsBernd-Peter Paris
 

Destaque (8)

A switched reluctance generator with interleaved interface dc–dc converter
A switched reluctance generator with interleaved interface dc–dc converterA switched reluctance generator with interleaved interface dc–dc converter
A switched reluctance generator with interleaved interface dc–dc converter
 
Programmable PN Sequence Generators
Programmable PN Sequence GeneratorsProgrammable PN Sequence Generators
Programmable PN Sequence Generators
 
EFFICIENT FPGA IMPLEMENTATION OF ADDRESS GENERATOR FOR WIMAX DEINTERLEAVER
EFFICIENT FPGA IMPLEMENTATION OF ADDRESS GENERATOR FOR WIMAX DEINTERLEAVEREFFICIENT FPGA IMPLEMENTATION OF ADDRESS GENERATOR FOR WIMAX DEINTERLEAVER
EFFICIENT FPGA IMPLEMENTATION OF ADDRESS GENERATOR FOR WIMAX DEINTERLEAVER
 
Spread-Spectrum Techniques
Spread-Spectrum TechniquesSpread-Spectrum Techniques
Spread-Spectrum Techniques
 
Pseudo Random Bit Sequence Generator
Pseudo Random Bit Sequence Generator Pseudo Random Bit Sequence Generator
Pseudo Random Bit Sequence Generator
 
Pn sequence
Pn sequencePn sequence
Pn sequence
 
Bit interleaved coded modulation
Bit interleaved coded modulationBit interleaved coded modulation
Bit interleaved coded modulation
 
Simulation of Wireless Communication Systems
Simulation of Wireless Communication SystemsSimulation of Wireless Communication Systems
Simulation of Wireless Communication Systems
 

Semelhante a Coding and ANN - assisted Pseudo - Noise Sequence Generator for DS / FH Spread Spectrum Modulation for Wireless Channels

Electricity Demand Forecasting Using Fuzzy-Neural Network
Electricity Demand Forecasting Using Fuzzy-Neural NetworkElectricity Demand Forecasting Using Fuzzy-Neural Network
Electricity Demand Forecasting Using Fuzzy-Neural NetworkNaren Chandra Kattla
 
Fuzzy Logic Approach to Improving Stable Election Protocol for Clustered Hete...
Fuzzy Logic Approach to Improving Stable Election Protocol for Clustered Hete...Fuzzy Logic Approach to Improving Stable Election Protocol for Clustered Hete...
Fuzzy Logic Approach to Improving Stable Election Protocol for Clustered Hete...chokrio
 
Differential Protection of Generator by Using Neural Network, Fuzzy Neural an...
Differential Protection of Generator by Using Neural Network, Fuzzy Neural an...Differential Protection of Generator by Using Neural Network, Fuzzy Neural an...
Differential Protection of Generator by Using Neural Network, Fuzzy Neural an...Waqas Tariq
 
Optimal neural network models for wind speed prediction
Optimal neural network models for wind speed predictionOptimal neural network models for wind speed prediction
Optimal neural network models for wind speed predictionIAEME Publication
 
Optimal neural network models for wind speed prediction
Optimal neural network models for wind speed predictionOptimal neural network models for wind speed prediction
Optimal neural network models for wind speed predictionIAEME Publication
 
Optimal neural network models for wind speed prediction
Optimal neural network models for wind speed predictionOptimal neural network models for wind speed prediction
Optimal neural network models for wind speed predictionIAEME Publication
 
A survey research summary on neural networks
A survey research summary on neural networksA survey research summary on neural networks
A survey research summary on neural networkseSAT Publishing House
 
CONTRAST OF RESNET AND DENSENET BASED ON THE RECOGNITION OF SIMPLE FRUIT DATA...
CONTRAST OF RESNET AND DENSENET BASED ON THE RECOGNITION OF SIMPLE FRUIT DATA...CONTRAST OF RESNET AND DENSENET BASED ON THE RECOGNITION OF SIMPLE FRUIT DATA...
CONTRAST OF RESNET AND DENSENET BASED ON THE RECOGNITION OF SIMPLE FRUIT DATA...rinzindorjej
 
CONTRAST OF RESNET AND DENSENET BASED ON THE RECOGNITION OF SIMPLE FRUIT DATA...
CONTRAST OF RESNET AND DENSENET BASED ON THE RECOGNITION OF SIMPLE FRUIT DATA...CONTRAST OF RESNET AND DENSENET BASED ON THE RECOGNITION OF SIMPLE FRUIT DATA...
CONTRAST OF RESNET AND DENSENET BASED ON THE RECOGNITION OF SIMPLE FRUIT DATA...rinzindorjej
 
A new method for controlling and maintaining
A new method for controlling and maintainingA new method for controlling and maintaining
A new method for controlling and maintainingIJCNCJournal
 
Biomedical Signals Classification With Transformer Based Model.pptx
Biomedical Signals Classification With Transformer Based Model.pptxBiomedical Signals Classification With Transformer Based Model.pptx
Biomedical Signals Classification With Transformer Based Model.pptxSandeep Kumar
 
THE PERFORMANCE OF CONVOLUTIONAL CODING BASED COOPERATIVE COMMUNICATION: RELAY
THE PERFORMANCE OF CONVOLUTIONAL CODING BASED COOPERATIVE COMMUNICATION: RELAYTHE PERFORMANCE OF CONVOLUTIONAL CODING BASED COOPERATIVE COMMUNICATION: RELAY
THE PERFORMANCE OF CONVOLUTIONAL CODING BASED COOPERATIVE COMMUNICATION: RELAYIJCNCJournal
 
A New Classifier Based onRecurrent Neural Network Using Multiple Binary-Outpu...
A New Classifier Based onRecurrent Neural Network Using Multiple Binary-Outpu...A New Classifier Based onRecurrent Neural Network Using Multiple Binary-Outpu...
A New Classifier Based onRecurrent Neural Network Using Multiple Binary-Outpu...iosrjce
 
Transfer learning for epilepsy detection using spectrogram images
Transfer learning for epilepsy detection using spectrogram imagesTransfer learning for epilepsy detection using spectrogram images
Transfer learning for epilepsy detection using spectrogram imagesIAESIJAI
 
DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...
DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...
DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...cscpconf
 
Mobile Network Coverage Determination at 900MHz for Abuja Rural Areas using A...
Mobile Network Coverage Determination at 900MHz for Abuja Rural Areas using A...Mobile Network Coverage Determination at 900MHz for Abuja Rural Areas using A...
Mobile Network Coverage Determination at 900MHz for Abuja Rural Areas using A...ijtsrd
 
Capacity Enhancement of MIMO-OFDM System in Rayleigh Fading Channel
Capacity Enhancement of MIMO-OFDM System in Rayleigh Fading ChannelCapacity Enhancement of MIMO-OFDM System in Rayleigh Fading Channel
Capacity Enhancement of MIMO-OFDM System in Rayleigh Fading ChannelIOSR Journals
 

Semelhante a Coding and ANN - assisted Pseudo - Noise Sequence Generator for DS / FH Spread Spectrum Modulation for Wireless Channels (20)

Electricity Demand Forecasting Using Fuzzy-Neural Network
Electricity Demand Forecasting Using Fuzzy-Neural NetworkElectricity Demand Forecasting Using Fuzzy-Neural Network
Electricity Demand Forecasting Using Fuzzy-Neural Network
 
Fuzzy Logic Approach to Improving Stable Election Protocol for Clustered Hete...
Fuzzy Logic Approach to Improving Stable Election Protocol for Clustered Hete...Fuzzy Logic Approach to Improving Stable Election Protocol for Clustered Hete...
Fuzzy Logic Approach to Improving Stable Election Protocol for Clustered Hete...
 
Differential Protection of Generator by Using Neural Network, Fuzzy Neural an...
Differential Protection of Generator by Using Neural Network, Fuzzy Neural an...Differential Protection of Generator by Using Neural Network, Fuzzy Neural an...
Differential Protection of Generator by Using Neural Network, Fuzzy Neural an...
 
Ffnn
FfnnFfnn
Ffnn
 
Optimal neural network models for wind speed prediction
Optimal neural network models for wind speed predictionOptimal neural network models for wind speed prediction
Optimal neural network models for wind speed prediction
 
Optimal neural network models for wind speed prediction
Optimal neural network models for wind speed predictionOptimal neural network models for wind speed prediction
Optimal neural network models for wind speed prediction
 
Optimal neural network models for wind speed prediction
Optimal neural network models for wind speed predictionOptimal neural network models for wind speed prediction
Optimal neural network models for wind speed prediction
 
A survey research summary on neural networks
A survey research summary on neural networksA survey research summary on neural networks
A survey research summary on neural networks
 
CONTRAST OF RESNET AND DENSENET BASED ON THE RECOGNITION OF SIMPLE FRUIT DATA...
CONTRAST OF RESNET AND DENSENET BASED ON THE RECOGNITION OF SIMPLE FRUIT DATA...CONTRAST OF RESNET AND DENSENET BASED ON THE RECOGNITION OF SIMPLE FRUIT DATA...
CONTRAST OF RESNET AND DENSENET BASED ON THE RECOGNITION OF SIMPLE FRUIT DATA...
 
CONTRAST OF RESNET AND DENSENET BASED ON THE RECOGNITION OF SIMPLE FRUIT DATA...
CONTRAST OF RESNET AND DENSENET BASED ON THE RECOGNITION OF SIMPLE FRUIT DATA...CONTRAST OF RESNET AND DENSENET BASED ON THE RECOGNITION OF SIMPLE FRUIT DATA...
CONTRAST OF RESNET AND DENSENET BASED ON THE RECOGNITION OF SIMPLE FRUIT DATA...
 
A new method for controlling and maintaining
A new method for controlling and maintainingA new method for controlling and maintaining
A new method for controlling and maintaining
 
Biomedical Signals Classification With Transformer Based Model.pptx
Biomedical Signals Classification With Transformer Based Model.pptxBiomedical Signals Classification With Transformer Based Model.pptx
Biomedical Signals Classification With Transformer Based Model.pptx
 
THE PERFORMANCE OF CONVOLUTIONAL CODING BASED COOPERATIVE COMMUNICATION: RELAY
THE PERFORMANCE OF CONVOLUTIONAL CODING BASED COOPERATIVE COMMUNICATION: RELAYTHE PERFORMANCE OF CONVOLUTIONAL CODING BASED COOPERATIVE COMMUNICATION: RELAY
THE PERFORMANCE OF CONVOLUTIONAL CODING BASED COOPERATIVE COMMUNICATION: RELAY
 
H017376369
H017376369H017376369
H017376369
 
A New Classifier Based onRecurrent Neural Network Using Multiple Binary-Outpu...
A New Classifier Based onRecurrent Neural Network Using Multiple Binary-Outpu...A New Classifier Based onRecurrent Neural Network Using Multiple Binary-Outpu...
A New Classifier Based onRecurrent Neural Network Using Multiple Binary-Outpu...
 
Transfer learning for epilepsy detection using spectrogram images
Transfer learning for epilepsy detection using spectrogram imagesTransfer learning for epilepsy detection using spectrogram images
Transfer learning for epilepsy detection using spectrogram images
 
Path loss prediction
Path loss predictionPath loss prediction
Path loss prediction
 
DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...
DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...
DESIGN AND IMPLEMENTATION OF BINARY NEURAL NETWORK LEARNING WITH FUZZY CLUSTE...
 
Mobile Network Coverage Determination at 900MHz for Abuja Rural Areas using A...
Mobile Network Coverage Determination at 900MHz for Abuja Rural Areas using A...Mobile Network Coverage Determination at 900MHz for Abuja Rural Areas using A...
Mobile Network Coverage Determination at 900MHz for Abuja Rural Areas using A...
 
Capacity Enhancement of MIMO-OFDM System in Rayleigh Fading Channel
Capacity Enhancement of MIMO-OFDM System in Rayleigh Fading ChannelCapacity Enhancement of MIMO-OFDM System in Rayleigh Fading Channel
Capacity Enhancement of MIMO-OFDM System in Rayleigh Fading Channel
 

Mais de IDES Editor

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A ReviewIDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCIDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingIDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsIDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetIDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyIDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’sIDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance AnalysisIDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesIDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...IDES Editor
 

Mais de IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A ReviewPower System State Estimation - A Review
Power System State Estimation - A Review
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFCLine Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric ModelingAssessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive ThresholdsSelfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP BotnetGenetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’sLow Energy Routing for WSN’s
Low Energy Routing for WSN’s
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
 
Rotman Lens Performance Analysis
Rotman Lens Performance AnalysisRotman Lens Performance Analysis
Rotman Lens Performance Analysis
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral ImagesBand Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
 

Último

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 

Último (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Coding and ANN - assisted Pseudo - Noise Sequence Generator for DS / FH Spread Spectrum Modulation for Wireless Channels

  • 1. ACEEE Int. J. on Communication, Vol. 02, No. 02, July 2011 Coding and ANN - assisted Pseudo - Noise Sequence Generator for DS / FH Spread Spectrum Modulation for Wireless Channels Juthika Gogoi and Kandarpa Kumar Sarma Department of Electronics and Communication Engineering, Tezpur University, Tezpur, India Email: juthikagogoi@gmail.com Department of Electronics Communication and Technology, Gauhati University, Guwahati, India Email: kandarpaks@gmail.com Abstract—One of the challenging issues in Spread-Spectrum Modulation (SSM) is the design of the Pseudo - Random or Pseudo - Noise (PN) sequence generator as an option to the already available methods. This work is related to the use of Artificial Neural Network (ANN) for generation of the PN sequence during transmission and reception of a SSM based system. The benefit of the ANN - assisted PN generator shall be that it will simplify the design process of the PN - generator and yet provide high reliability against disruptions due to intentional disruptions and degradation of signal quality resulting out of variations in channel condition. The Figure 1 : Direct sequence spread spectrum system performance of the SSM system can be further enhanced by the use of coding. Hamming and cyclic redundancy check (CRC) codes have been used here with the data stream to explore if performance of the SSM system is improved further. Index Terms—SSM, PN sequence, ANN, Rayleigh, Rician I. INTRODUCTION Spread Spectrum Modulation (SSM) is a transmission technique in which a Pseudo-Noise (PN) code independent of the information data is used as a modulation waveform to spread the signal energy over a bandwidth much greater than Figure 2 : FHSS transmitter and receiver the signal information bandwidth. This technique decreases the potential interference to other receivers while achieving II. SYSTEM MODEL privacy [1]. For the SSM system performance, the processing gain of the spreading code is one of the major concerns. The The system model is depicted in Fig. 3. It is constituted processing gain depends on the code length of the spreading by a SSM transmitter with a PN sequence generator formed code. The larger the processing gain, the better is the system by an ANN. The receiver is also assisted by an ANN. The performance [2]. This is dependent on the PN sequence to be ANN is trained to generate the unique PN sequences which used for the SSM. There are several approaches to how a PN are used for transmission and reception of specific data sequence can be generated, but this work considers a PN blocks. The core of the system is the ANN. The most important sequence generator assisted by Artificial Neural Network difference with respect to classical information processing (ANN) for transmission and reception. A direct sequence techniques is that ANNs are not mathematically programmed, (DS) spread spectrum signal is generated by the direct mixing but are trained with examples [7]. The system model related of the incoming data with a spreading waveform before the to this work is depicted in Fig. 3 and has the components as final carrier modulation. But in frequency hopping (FH) the described below. spectrum of a data-modulated carrier is widened by changing A. ANN Formation the carrier frequency in a pseudo-random manner over a sequence of frequencies called the frequency hopping pattern A feed-forward ANN is created with parameters as in Table [3][4][5][6]. A generic SSM setup with both DS and FH I. It is known as Multi-Layer Perceptron (MLP) (Fig. 4). The approaches is depicted in the Figs. 1 and 2. equation for output in a MLP with one hidden layer is given as [8]: 26 © 2011 ACEEE DOI: 01.IJCOM.02.02.180
  • 2. ACEEE Int. J. on Communication, Vol. 02, No. 02, July 2011 Figure 3 : System Model FIGURE 4 : MULTI-LAYER PERCEPTRON TABLE I : NETWORK PARAMETERS (1) where βi is the bias value and wi weight value between the ith hidden neuron. The process of adjusting the weights and biases of the MLP is known as training. Training the MLP is done in two broad passes - one a forward pass and the other a backward calculation with error determination and connecting weight updating in between. The output from the hidden layer is obtained depending upon the choice of the activation function. The values of the hidden nodes are : L h h net mj  w ji p mi   jh (2) where η is the learning rate. One cycle through the complete i 1 training set forms one epochs. The above is repeated till The values of the of output node can be obtained as : MSE meets the performance criteria.This cycle constitutes o o mk  f ko net mj h   (3) the learning phase of the MLP [8]. Forward Computation: The errors can be computed as : B. Training and Testing e jn  d jn  o jn (4) ANNs can generalize and correctly classify inputs The mean square error (MSE) is calculated as : unknown to them previously. A training set is used to help the ANN learn which is reflected by a continuous update of M L network weights and biases, and after training, each network   e2 jn go through a testing procedure to gather data for evaluation MSE  j 1 n 1 (5) of its usefulness. One set of data is created for training the 2M ANN. The data set consists of DPSK modulated signals along Error terms for the output layer are : with ANN-assisted PN sequence. The DPSK modulated signal has a signal-to-noise (SNR) variation between -10 to 30 dB which makes 41 sets with signal variations. Further there are Error terms for the hidden layer : variations like Gaussian and fading (Rayleigh and Rician) channels. This way a total of 123 signalling conditions are obtained. Of each signalling condition atleast 10 sets are Weight Update : Between the output and hidden layers taken as samples to make the training robust. Similarly a testing set is created to validate the training. This set of data consists of data bits whose length is equal to the PN sequence and is presented to each ANN. Network specific 27 © 2011 ACEEE DOI: 01.IJCOM.02.02.180
  • 3. ACEEE Int. J. on Communication, Vol. 02, No. 02, July 2011 TABLE II : PARAMETERS OF THE PN SEQUENCE FOR THE DSSSM SYSTEM TABLE III : PARAMETERS OF T HE PN SEQUENCE FOR THE FHSSM SYSTEM procedures are then used to compare the output of each ANN against the desired outputs. The training time is a parameter E. System design that is independent of the test data and is the number of With reference to Fig. 3 the PN sequence used in the seconds spent training a particular network. analysis of the DSSSM system has the parameters as shown in Table II. In both DS and FH systems a 32 bit binary stream C. Evaluation is taken as the message signal. The data in this signal can Running an ANN simulation produces a matrix of actual take two amplitudes, where one amplitude corresponds to network outputs. These values can be compared to a target logical 1 and the other amplitude to logical 0. This data stream matrix of desired ANN outputs to evaluate the performance is multiplied with a cosine function of a higher frequency. In of each network. The input layer consists of a few number of fact, this modulation can be considered as the primary nodes equal to the length of the PN sequence. The output modulation. Mathematically, layer has a size equal to the number of bits to be included in (9) the ANN generated PN sequence. The performance function such that the pre-modulated signal m(t) is given as is the least mean of squared error (LMSE) which minimizes the average of the squared network errors. Once all the inputs (10) have been presented, the training algorithm modifies the where f = f1 and f = f2 are the two frequencies for s(t) = 1 and weights according to its procedure. The total number of s(t) = -1 respectively taken such that these frequencies lie epochs for each ANN is around 5000. The training of the within the spread spectrum bandwidth. ANN is carried out using four different training methods. For simplicity, it has been assumed that all amplitudes are These are equal to one. After the primary modulation, the signal is  Backpropagation with gradient descent (BPGD). modulated again, to spread its frequency spectrum. This  Backpropagation with gradient descent and modulation is the multiplication of the signal m(t) with a digital momentum (BPGDM). signal of larger frequency range. The transmitted spread  Backpropagation with gradient descent and adaptive spectrum signal is given by learning rate (BPGDA). (11)  Backpropagation with gradient descent, momentum and adaptive learning rate (BPGDX). where c(t) is the PN sequence. Out of these four training methods, BPGD turns out to be At the transmitter, binary symbols are transmitted with energy most efficient in terms of training time, accuracy and number E per symbol. The noise n(t) added to this transmitted signal of epochs required to reach the desired goal. has an effect only on the amplitude. It depends on the signal- to-noise ratio (SNR). Hence the signal transmitted through D. Hamming and CRC coding the channel can be represented by the following equation Hamming code is a linear error-correcting code which can (12) detect up to two simultaneous bit errors, and correct single- bit errors. Thus reliable communication is possible when the To recreate data at the receiver, the signal is despreaded first Hamming distance between the transmitted and received bit and then normally demodulated. The despreading can only patterns is less than or equal to one. By contrast, the simple be successful if the code sequence generated in the receiver parity code cannot correct errors, and can only detect an odd is exactly synchronised with that of the received signal. The number of errors [9]. A cyclic redundancy check (CRC) is an parameters of the PN sequence used for the analysis of the error-detecting code designed to detect accidental changes FHSSM system are given in Table III. With each of the signal to raw data, based on the theory of cyclic error-correcting sets considered, a unique PN sequence is generated by the codes. CRCs are so called because the check (data ANN. There is a one-to-one correspondence between the verification) code is a redundancy (it adds zero information signal to be transmitted and the PN sequence generated. to the message) and the algorithm is based on cyclic codes This correspondence is used at the receiver for recovery of [9]. the data. The ANN for a given input of received signal provides the unique PN code. The precision of the PN code can be varied with better ANN configuration and training. 28 © 2011 ACEEE DOI: 01.IJCOM.02.02.180
  • 4. ACEEE Int. J. on Communication, Vol. 02, No. 02, July 2011 TABLE IV : B ER FOR DIFFERENT VALUES O F T HE JAMMING FACTOR OF TABLE VII : B ER FOR DIFFERENT VALUES O F T HE JAMMING FACTOR OF DSSSM SYSTEM DSSSM SYSTEM SYMBOLFOR HAMMING AND CRC CODE INFORMATION SEQUENCE TABLE V : BER FOR D IFFERENT HOPS O F T HE PN SEQUENCE OF FHSSM SYSTEM TABLE VIII : BER FOR D IFFERENT HOPS O F T HE PN SEQUENCE OF FHSSM SYSTEM SYMBOLFOR HAMMING AND CRC CODE INFORMATION SEQUENCE TABLE VI : BER FOR DIFFERENT VALUES O F T HE JAMMING FACTOR OF FHSSM SYSTEM AT 2 HOPS/SYMBOL III. RESULTS AND DISCUSSION Based on the data generated by simulation of DSSSM and FHSSM systems, relationship using DPSK modulation technique between BER as a function of the jamming factor and number of hops is obtained using the PN sequence Tables IV – VI. Table IV shows that with the increase in the jamming factor from 0.1 to 1.0, the BER decreases from 0.0366 to 0.0216 The entire system is trained and tested in a setup closely for the PN sequence generated using shift registers while the related to an environment where the SSM operates. The BER decreases from 0.0307 to 0.0186 for the PN sequence performance of the spread spectrum system in presence of generated using ANNs. Table V shows that in case of the partial band noise jammer is analysed for different fractions FHSSM system using the PN sequence generated using shift of the spread spectrum bandwidth. A jammer is considered registers, as the number of hops is increased from 2 hops/ that transmits noise over a fraction of the total spread symbol to 10 hops/symbol, the BER is 0.0295 and 0.0250 spectrum bandwidth. The jammer signal is a Gaussian noise respectively and 0.0286 and 0.0249 respectively for the PN with a flat power spectral density over the jammed bandwidth. sequence generated using ANNs. Table VI shows that in The jammer spreads noise of the total power J over some case of the FHSSM system, keeping the hop rate at 2 hops/ frequency range of bandwidth Wj, which is a subset of the symbol, as the jamming factor is increased from 0.1 to 1.0, total spread spectrum bandwidth Wss. It is assumed that the BER of 0.0295 and 0.0233 respectively is generated using the shifts in the jammed band coincide with carrier hop transitions. PN sequence generated using shift registers while the BER is It is experimentally found that when the fraction of the 0.0286 and 0.0223 in case of the PN sequence generated using jamming bandwidth is decreased, the probability of the system ANNs. Based on the data generated by simulation of the being jammed is decreased but the jammed signals suffer a DSSSM and FHSSM systems, relationship using DPSK higher error rate, resulting in a degradation in the performance modulation technique between BER as a function of the of the system and vice-versa. The error rate is also calculated jamming factor and number of hops is obtained in Tables by varying the number of hops per data symbol. VII–IX for both Hamming and CRC coded information 29 © 2011 ACEEE DOI: 01.IJCOM.02.02.180
  • 5. ACEEE Int. J. on Communication, Vol. 02, No. 02, July 2011 sequence. Table VII shows that with the increase in the TABLE IX : BER FOR DIFFERENT VALUES O F T HE JAMMING FACTOR OF FHSSM SYSTEM AT 2 HOPS/SYMBOLFOR HAMMING AND CRC CODE INFORMATION jamming factor from 0.1 to 1.0, the BER goes down from 0.0265 SEQUENCE to 0.0169 for the PN sequence generated using shift registers. The corresponding BER is 0.0240 at jamming factor 0.1 and 0.0156 at jamming factor of 1for the PN sequence generated using ANNs for the Hamming coded sequence. The BER is 0.0299 at jamming factor 0.1 and 0.0183 at jamming factor of 1 for the PN sequence generated using shift registers. For the CRC coded sequence the BER is 1x10-4 at jamming factor 0.1 and 1x10-4 at jamming factor of 1 for the PN sequence generated using ANNs. Table VIII shows that in case of the FHSSM system using the PN sequence generated using shift registers, as the number of hops is increased from 2 hops/symbol to 10 hops/symbol, the BER is 0.0251 and 0.0246 respectively and 0.0242 and 0.0240 respectively for the PN sequence generated using ANNs for both the Hamming coded sequence and the CRC coded sequence. Table IX shows that in case of the FHSSM system, keeping the hop rate at 2 hops/symbol, as the jamming factor is increased from 0.1 to 1.0, BER of 0.0265 and 0.0169 respectively is generated using the PN sequence generated using shift registers while the BER is 0.0240 and 0.0156 in case of the PN sequence generated using ANNs for REFERENCES the Hamming coded sequence while the BER is 0.0299 and 0.0183 for the PN sequence generated using shift registers [1] G. Ponuratinam, B. Patel and S. S. R. K. M. Elleithy, and 1x10-4 in case of the PN sequence generated using ANNs “Improvement in the Spread Spectrum System in DSSS, FHSS, and CDMA,” Computer Science and Engineering Department, for the CRC coded sequence. From the above tables it is University of Bridgeport, Bridgeport, CT 06605. seen that when the information sequence is coded using [2] M. L. Wu, K. A. Wen and C. W. Huang, “Efficient Hamming and CRC coding the BER has reduced though the Pseudonoise Code Design for Spread Spectrum Wireless use of coding bits leads to some waste in bandwidth. The Communication Systems”. IEEE Transactions on Circuits and BER with CRC coding has fallen to 4x10-4 and 10-4 in Rayleigh systems II: Analog and Digital Signal Processing, Vol. 48, No. 6, fading channels without ANN and Rayleigh fading channel June 2001. with ANN respectively over the SNR range -10dB to 30 dB. It [3] S. Haykin, “Digital Communications,” John Wiley and Sons represents 13% and 14% improvement compared to uncoded Inc, United Kingdom, 2010. forms. Thus the use of ANN-assisted PN sequence [4] S. Zoican,”Frequency Hopping Spread Spectrum Technique for Wireless Communication Systems,” IEEE Transactions on generation and coding is justified for application in DS/FH Communications, 1998. SSM in wireless channels. [5] T. S. D. Tsui and T. G. Clarkson, “Spread Spectrum Communication Techniques,” Electronics and Communication IV. CONCLUSION Engineering Journal, pp 3-6, February 1994. [6] G. J. R. Povey and P. M. Grant, “Simplified matched filter The work shows the effectiveness of the use of ANN for receiver designs for spread spectrum communications applications,” PN sequence generator and coding for both DS and FH SSM Electronics and Communication Engineering journal, April 1993. systems. The extracted results show that the ANN assisted [7] P. de Bruyne, 0. Kjelsen and 0. Sacroug, “Spread Spectrum PN sequence generator helps in providing superior BER Digital Signal Synchronization using Neural Networks,” IEEE values in both Gaussian and Multipath faded channels. The Transactions on Communications, 1992. work also demonstrates that performance improves further [8] S. Haykin: Neural Networks: A Comprehensive Foundation with the use of coding. The combination proves to be (2nd Edition), Pearson Education, New Delhi, 1998. effective in wireless channels. The ANN assisted PN [9] W. E. Ryan and S. Lin, Channel Codes: Classical and Modern, sequence is robust enough to prevent false triggering which Cambridge University Press, New York, 2009. also helps it to provide better performance in wireless channels. Thus, the system proposed can prove to be effective and enhance performance of DS/FH SSM transmission. 30 © 2011 ACEEE DOI: 01.IJCOM.02.02.180